☆28Jan 27, 2017Updated 9 years ago
Alternatives and similar repositories for Teaser-2017
Users that are interested in Teaser-2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 25, 2019Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- A library to facilitate the exploitation of padding oracle attacks☆15Apr 1, 2015Updated 11 years ago
- ☆14Apr 28, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Architecture-agnostic ROP gadget finder using JEB's IR☆23Oct 6, 2017Updated 8 years ago
- Created while playing https://sourcery.pwnadventure.com☆26Nov 16, 2018Updated 7 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Cream of the Crop Pwning Challenges☆32Feb 1, 2020Updated 6 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 8 years ago
- Research related☆89Apr 5, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exposing and documenting v8 runtime functions.☆28Jul 1, 2014Updated 11 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- Content from presentation at BHUSA 2017☆179Jul 27, 2017Updated 8 years ago
- ☆90Sep 27, 2024Updated last year
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Oct 17, 2017Updated 8 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 5 years ago
- ☆93Jul 30, 2021Updated 4 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Easily create and share Proof of Concepts in HTML, JavaScript, etc. with custom headers, all via query parameters☆14Oct 1, 2025Updated 6 months ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- ☆23May 11, 2017Updated 8 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆31Nov 12, 2019Updated 6 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Nov 21, 2022Updated 3 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- ☆153Jan 6, 2019Updated 7 years ago