LiveOverflow / write-ups-2016
Wiki-like CTF write-ups repository, maintained by the community. 2016
☆26Updated 8 years ago
Alternatives and similar repositories for write-ups-2016:
Users that are interested in write-ups-2016 are comparing it to the libraries listed below
- 🏴 Collection of CTF solutions☆76Updated 5 years ago
- Sourcecode created during my Livestream (English)☆112Updated 4 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆69Updated 10 years ago
- Setup for a pwning VM☆60Updated 6 years ago
- ☆26Updated 6 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- Personal repository for all ctf related stuffs☆67Updated 3 months ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆116Updated 3 months ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- PoC for CVE-2015-6086☆68Updated 8 years ago
- ☆16Updated 6 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 6 years ago
- ☆93Updated 6 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 6 years ago
- Published vulnerabilities and exploits.☆55Updated last year
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Writeups for CTF competitions.☆32Updated 8 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- A Python tool to generate ROP chains☆60Updated 3 weeks ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆23Updated 9 years ago