TechSecCTF / CTF-pwn-tipsLinks
Here records some tips about pwn.
☆12Updated 4 years ago
Alternatives and similar repositories for CTF-pwn-tips
Users that are interested in CTF-pwn-tips are comparing it to the libraries listed below
Sorting:
- Exploitation and Mitigation Slides☆135Updated last year
- ☆111Updated 6 years ago
- Useful tips by OTA CTF members☆151Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- GlibC Malloc for Exploiters presentation☆152Updated 6 years ago
- ☆112Updated 6 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated 3 months ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- PEDA-like debugger UI for WinDbg☆206Updated last year
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Updated 6 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 3 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Updated 5 years ago
- Linux Heap Exploitation Practice☆395Updated 7 years ago
- a repo of links to useful writeups of pwn challenges☆31Updated 7 years ago
- ☆89Updated 7 years ago
- Collection of scripts and writeups☆321Updated 4 years ago
- repository for kernel exploit practice☆415Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Updated 6 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- Have fun with the LowFragmentationHeap☆253Updated 5 years ago
- Reversing list☆150Updated 2 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆437Updated 9 months ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Updated 6 years ago
- Attacking the Core associated source files☆89Updated 8 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆198Updated last year
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆160Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Updated 7 years ago
- An interactive memory info for pwning / exploiting☆98Updated 2 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- Cream of the Crop Pwning Challenges☆32Updated 6 years ago