OpenToAllCTF / OTA-UniversityLinks
Official training ground for the OTA CTF team
☆39Updated 3 years ago
Alternatives and similar repositories for OTA-University
Users that are interested in OTA-University are comparing it to the libraries listed below
Sorting:
- Slack bot for challenge management in large teams☆60Updated 3 years ago
- Setup for a pwning VM☆62Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆35Updated 4 years ago
- ☆92Updated last year
- r2con2019 - slides and materials☆137Updated 5 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36Updated 5 years ago
- various CTF writeups☆61Updated 7 years ago
- ☆89Updated 7 years ago
- ☆89Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆73Updated 8 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- Arcane Sector game - a CTF task, or old-school (MMO)RPG - depending on the perspective. The code is of terrible quality, you have been w…☆30Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Updated 6 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 6 years ago
- CTF write-ups / solution scripts☆23Updated 7 years ago
- Fuzz testing: Beginner's guide☆76Updated last year
- SSD Secure Disclosure Advisories☆170Updated 5 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- ☆16Updated 9 years ago
- ☆52Updated 4 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated 3 months ago
- An interactive memory info for pwning / exploiting☆98Updated 2 years ago
- Guide to buffer overflows☆59Updated 4 years ago