Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs
☆238Mar 6, 2025Updated last year
Alternatives and similar repositories for HackTheVote
Users that are interested in HackTheVote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Course materials for Malware Analysis by RPISEC☆4,003Aug 26, 2022Updated 3 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,950Dec 9, 2021Updated 4 years ago
- ☆28Jan 27, 2017Updated 9 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- CTF write-ups by Plaid Parliament of Pwning☆805Jun 4, 2024Updated last year
- Files from my DEFCON CTF VM.☆273Sep 6, 2016Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 9 years ago
- ☆142Apr 21, 2017Updated 8 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,002Aug 27, 2022Updated 3 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- ☆10Nov 19, 2016Updated 9 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- A library to facilitate the exploitation of padding oracle attacks☆15Apr 1, 2015Updated 10 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Solutions for CTFs☆10Dec 29, 2019Updated 6 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 7 months ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- AppJailLauncher in Rust☆108Jul 14, 2021Updated 4 years ago
- My proof-of-concept exploits for the Linux kernel☆1,569Sep 11, 2025Updated 6 months ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆1,625Oct 2, 2018Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- ☆429May 16, 2021Updated 4 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago