Nautilus-Institute / finals-2025View external linksLinks
Source code for the DEF CON 33 CTF Finals.
☆25Aug 26, 2025Updated 5 months ago
Alternatives and similar repositories for finals-2025
Users that are interested in finals-2025 are comparing it to the libraries listed below
Sorting:
- Integer overflow in FreeType software, which also affects Chrome☆23Aug 27, 2025Updated 5 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆43Feb 7, 2026Updated last week
- ☆21Apr 6, 2025Updated 10 months ago
- CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC☆93Jul 11, 2025Updated 7 months ago
- Authenticated 0-click RCE against Linux 6.1.45 for CVE-2023-52440 and CVE-2023-4130☆52Sep 13, 2025Updated 5 months ago
- ☆23Sep 26, 2023Updated 2 years ago
- ☆72Jan 29, 2026Updated 2 weeks ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆16Jun 22, 2025Updated 7 months ago
- Open Source XSS exploitation tool. using http proxy to access the browser which executed js. [Engineering Experimental]☆36Nov 22, 2024Updated last year
- Deserialization payload generator for a variety of .NET formatters☆176Dec 2, 2025Updated 2 months ago
- A project of BlackMyth: Wukong based on Unreal Engine 5.4. 基于虚幻5.4开发的仿黑神话悟空的动作游戏(同济大学 2024级 计算机科学与技术学院软件工程专业 程序设计范式 2025年秋 期末作业)☆24Jan 1, 2026Updated last month
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- ☆21May 15, 2025Updated 9 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Challenge handouts, source code, and solutions for UofTCTF 2026☆35Jan 13, 2026Updated last month
- 吉林大学校园网认证客户端(C语言版)☆14Nov 6, 2023Updated 2 years ago
- Git Challenge Quiz☆11Nov 12, 2018Updated 7 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- 🕹️ Powerful Web Console for administers and root|为管理员制作的网页端博客控制台☆10Feb 2, 2026Updated 2 weeks ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- Archive of AAA CTF 2023 (XCTF competition)☆37Nov 27, 2023Updated 2 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆40Aug 15, 2024Updated last year
- 免杀所有杀软、bypass all,绕过WB、VT ,0检测。☆169Oct 10, 2025Updated 4 months ago
- ☆30Nov 25, 2025Updated 2 months ago
- MobileGestalt hactivation vulnerability updated for iOS 18.6 - 26b2☆32Nov 8, 2025Updated 3 months ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆11Feb 14, 2019Updated 7 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- ☆14Jul 1, 2025Updated 7 months ago
- NTU Computer Security 2019 fall☆10Mar 20, 2021Updated 4 years ago
- OpenFOAM right wmake at the right time☆11Mar 10, 2019Updated 6 years ago
- Android webviews and securiy☆23Sep 18, 2025Updated 4 months ago
- ICPC codebook used by kiseki☆11Nov 11, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Solana Leader TPU List and Event Stream☆32Feb 3, 2026Updated last week