TeamGreyFang / CTF-WriteupsLinks
☆19Updated 5 years ago
Alternatives and similar repositories for CTF-Writeups
Users that are interested in CTF-Writeups are comparing it to the libraries listed below
Sorting:
- Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo☆39Updated 5 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- Qubes containerization on Windows☆130Updated 4 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- ☆37Updated 6 years ago
- Copy of the contents at phrack.com☆41Updated 10 months ago
- Corewars but within r2☆60Updated last year
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆61Updated 5 years ago
- ☆11Updated 4 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated last month
- ☆182Updated 6 years ago
- ☆21Updated 4 years ago
- CLI tool for PKCS7 padding oracle attacks☆142Updated 4 years ago
- A simple MBR hijack demonstration☆181Updated 3 years ago
- ☆21Updated last year
- Guide to buffer overflows☆59Updated 4 years ago
- Program for extracting TLS keys from Oculus Runtime☆53Updated 5 years ago
- AKA "Internet Chemotherapy"☆65Updated 8 years ago
- PageBuster - dump all executable pages of packed processes.☆204Updated 4 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- ☆13Updated 5 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆63Updated 4 years ago
- Setup for a pwning VM☆62Updated 7 years ago
- Architectural privilege escalation on x86☆61Updated 7 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 3 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆113Updated last year
- W3C Standards Vulnerability Disclosure & Handling Process and Policy☆25Updated 2 weeks ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago