MrEn1gma / Writeups
CTF writeups
☆17Updated 6 months ago
Alternatives and similar repositories for Writeups:
Users that are interested in Writeups are comparing it to the libraries listed below
- Short writeups/solvers for interesting CTF challenges.☆17Updated 2 years ago
- A collection of web browser CTF challenges and solutions.☆26Updated 2 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆30Updated 4 years ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆18Updated 8 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- ☆23Updated 2 months ago
- Writeups for CTFs☆69Updated last month
- My CTF writeups☆25Updated 3 years ago
- CTF challenges that I created☆18Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- Source code and solution of CTF challenges that I created.☆46Updated 10 months ago
- ☆32Updated 2 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆98Updated 2 months ago
- Binary exploitation exercises and scripts☆10Updated 3 years ago
- V8sandbox_bypass using stack misalignment☆19Updated 8 months ago
- ☆17Updated 2 years ago
- Udemy – Linux Heap Exploitation☆41Updated 3 years ago
- Source for challenges from bi0sCTF☆26Updated last year
- Slides about HyperDbg☆30Updated 3 weeks ago
- CTF challenges I've written☆35Updated 2 years ago
- Repo for talk slides & materials☆18Updated 5 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆32Updated 4 years ago
- ☆32Updated last year
- ☆21Updated last year
- Proof-of-Concept of exploits that may be published☆20Updated 6 months ago
- ☆50Updated 6 years ago
- My solutions for CTF challenges☆69Updated 3 months ago
- Kernel Read Write Execute☆41Updated 3 months ago