TechSecCTF / pwn_challsLinks
☆14Updated 6 years ago
Alternatives and similar repositories for pwn_challs
Users that are interested in pwn_challs are comparing it to the libraries listed below
Sorting:
- A repository for my conference presentations☆35Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- ☆78Updated 3 months ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated last year
- CTF writeups☆30Updated 3 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 3 years ago
- ☆11Updated 3 years ago
- My CTF writeups☆26Updated 3 years ago
- ☆48Updated 4 years ago
- ☆20Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆63Updated 2 years ago
- ☆18Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- ☆24Updated last year
- Organise and access data collected during internal network pentests☆10Updated 5 years ago
- LPE for CVE-2020-1054 targeting Windows 7 x64☆86Updated 4 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- ☆28Updated 3 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- Scripts I used during CTP☆67Updated 4 years ago
- Our team's CTF writeups☆10Updated 5 years ago
- ☆23Updated 4 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- ☆20Updated 3 years ago