Live-CTF / LiveCTF-DEFCON32Links
LiveCTF challenges and infrastructure at DEFCON 32 CTF
☆21Updated 4 months ago
Alternatives and similar repositories for LiveCTF-DEFCON32
Users that are interested in LiveCTF-DEFCON32 are comparing it to the libraries listed below
Sorting:
- public archive for corCTF 2023☆18Updated 2 years ago
- ☆23Updated 2 years ago
- Repo for talk slides & materials☆21Updated last year
- Challenges and solutions for Maple CTF 2022.☆28Updated 3 years ago
- ☆36Updated last year
- A GDB+GEF-style debugger for unloading Python pickles☆69Updated 5 months ago
- Source code for the DEF CON 31 CTF Qualifiers.☆126Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆60Updated last month
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 10 months ago
- ☆18Updated 4 months ago
- Challenge repository for ACSC 2024☆13Updated last year
- MCP for Pwn☆169Updated last week
- A collection of web browser CTF challenges and solutions.☆32Updated 2 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Updated last year
- Challenge source code and author write-ups for KalmarCTF☆68Updated 9 months ago
- All challenges from DiceCTF @ HOPE 2022☆28Updated 3 years ago
- ☆16Updated 2 years ago
- Repository to keep track of python memory corruption bugs that can be used to potentially bypass audit hooks☆60Updated 2 weeks ago
- a new class of file structure attacks☆57Updated 3 years ago
- My challenges for SECCON CTF 2022 Finals☆18Updated 2 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Updated 10 months ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- Let's get familiar with Windows pwn 😎☆60Updated 5 years ago
- public archive for corCTF 2022☆37Updated 3 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- ☆45Updated 3 months ago
- Source code for the DEF CON 30 CTF Finals.☆55Updated 3 years ago
- A V8 Sandbox Escape Technique.☆32Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆19Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆97Updated last week