JustHitTheCore / ctf_workshops
This repo contains materials from Just Hit the Core CTF team workshops organized thanks to KNI Kernel at AGH University of Science and Technology. As the workshops are in polish, so are the materials here.
☆11Updated 7 years ago
Alternatives and similar repositories for ctf_workshops:
Users that are interested in ctf_workshops are comparing it to the libraries listed below
- ☆91Updated 3 years ago
- Symbolic Execution Tool in r2☆104Updated 3 years ago
- ☆16Updated 6 years ago
- Some kernel exploits☆144Updated 7 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆86Updated 5 years ago
- Solutions for my 34C3CTF challenges☆21Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- ☆84Updated 8 years ago
- Some new commands debug heap for peda☆98Updated 4 years ago
- A collection of more than 1000 binary libc files☆87Updated 9 years ago
- Radare 2 wiki☆91Updated 4 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆131Updated 5 years ago
- ☆88Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- ☆82Updated 7 years ago
- Automatic Vulnerability Discovery☆37Updated 5 years ago
- The Harvest of V8 regress.☆137Updated 4 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆140Updated 5 years ago
- ☆77Updated 9 years ago
- ☆40Updated 7 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆158Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- VirtualBox 3D exploits & PoCs☆160Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆44Updated 11 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆89Updated 9 years ago
- Simple shellcode testing tool.☆48Updated 12 years ago
- ☆121Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆89Updated 5 years ago
- GUI tool to create ROP chains using the ropper API☆155Updated 6 years ago