Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs
☆238Mar 6, 2025Updated 11 months ago
Alternatives and similar repositories for HackTheVote
Users that are interested in HackTheVote are comparing it to the libraries listed below
Sorting:
- Course materials for Malware Analysis by RPISEC☆4,001Aug 26, 2022Updated 3 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Files from my DEFCON CTF VM.☆273Sep 6, 2016Updated 9 years ago
- ☆43Jul 2, 2018Updated 7 years ago
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- ☆28Jan 27, 2017Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- Collection of pin tools☆52Dec 29, 2015Updated 10 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- linux rootkit☆162Feb 12, 2018Updated 8 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- Write ups☆16Dec 13, 2017Updated 8 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Feb 5, 2017Updated 9 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- PoC for CVE-2018-18500 - Firefox Use-After-Free☆61Apr 18, 2019Updated 6 years ago
- ☆142Apr 21, 2017Updated 8 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆149Oct 5, 2017Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- Droidefense: Advance Android Malware Analysis Framework☆478Dec 14, 2022Updated 3 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Feb 10, 2019Updated 7 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- BSidesSF CTF 2017 release☆126May 27, 2022Updated 3 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 6 months ago