Pusty / writeupsLinks
Writeups for CTFs
☆78Updated 3 months ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- An intuitive query API for IDA Pro☆164Updated last month
- Automatic ROPChain Generation☆293Updated 5 years ago
- A tool for automating setup of kernel pwn challenges☆60Updated last month
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆207Updated 6 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆195Updated last year
- ☆45Updated 3 months ago
- pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features☆170Updated 6 months ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆46Updated 3 years ago
- ☆149Updated last year
- ☆84Updated 3 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Updated 3 years ago
- angr tutorial for ctf☆163Updated 4 years ago
- a new class of file structure attacks☆57Updated 3 years ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆47Updated last year
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆89Updated 6 years ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated 7 months ago
- Let's get familiar with Windows pwn 😎☆60Updated 5 years ago
- archive of the released challenges from corCTF 2021☆25Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆108Updated 4 years ago
- Binary exploitation by confusing the unwinder☆66Updated 2 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated last month
- Linux & Android Kernel Vulnerability research and exploitation☆55Updated 2 years ago
- ☆133Updated 2 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆94Updated 2 years ago
- A /proc/mem IDA loader to snapshot a running process☆166Updated 5 months ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Collection of browser challenges☆138Updated 4 years ago
- Write dynamic binary analysis tools in Python☆128Updated 4 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆260Updated 2 months ago