MrEn1gma / Writeups
CTF writeups
☆17Updated 5 months ago
Alternatives and similar repositories for Writeups:
Users that are interested in Writeups are comparing it to the libraries listed below
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- A collection of web browser CTF challenges and solutions.☆26Updated 2 years ago
- My CTF writeups☆25Updated 3 years ago
- Source for challenges from bi0sCTF☆25Updated last year
- ☆17Updated 2 years ago
- Repo for talk slides & materials☆17Updated 4 months ago
- ☆45Updated last year
- Repo for storing CTF related stuff (Writeups, etc.)☆51Updated last year
- Short writeups/solvers for interesting CTF challenges.☆17Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- V8sandbox_bypass using stack misalignment☆19Updated 7 months ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆17Updated 7 months ago
- ☆19Updated last year
- ☆23Updated 2 months ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Updated 4 years ago
- reverse engninering & pwn writeup☆24Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month
- ☆49Updated 6 years ago
- ☆32Updated last year
- A Linux x86/x86-64 tool to trace registers and memory regions.☆37Updated 2 years ago
- Writeups for CTFs☆69Updated 3 weeks ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆30Updated 4 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆67Updated last month
- Slides about HyperDbg☆30Updated 10 months ago
- CTF challenges that I created☆18Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- A V8 Sandbox Escape Technique.☆21Updated 8 months ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆30Updated 4 years ago
- The official challenges and deployment source code files used in San Diego CTF 2022.☆27Updated 2 years ago