OpenToAllCTF / OTA-Challenge-Bot
Slack bot for challenge management in large teams
☆60Updated 2 years ago
Alternatives and similar repositories for OTA-Challenge-Bot:
Users that are interested in OTA-Challenge-Bot are comparing it to the libraries listed below
- Setup for a pwning VM☆60Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Official training ground for the OTA CTF team☆39Updated 2 years ago
- ☆16Updated 6 years ago
- ☆88Updated 6 years ago
- CTF write-ups / solution scripts☆23Updated 6 years ago
- Helper script for working with format string bugs☆57Updated 4 years ago
- Repo for CSAW CTF 2018 Finals challenges☆58Updated 6 years ago
- ☆26Updated 6 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- Radare 2 wiki☆91Updated 4 years ago
- A tool for finding the one gadget RCE in libc☆75Updated 4 years ago
- ☆49Updated 7 years ago
- 🏴 Collection of CTF solutions☆76Updated 5 years ago
- various CTF writeups☆60Updated 6 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- ☆87Updated 6 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- ☆77Updated 9 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆68Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 4 months ago
- Guide to buffer overflows☆58Updated 3 years ago