TechSecCTF / pwn_challs
☆14Updated 6 years ago
Alternatives and similar repositories for pwn_challs
Users that are interested in pwn_challs are comparing it to the libraries listed below
Sorting:
- A repository for my conference presentations☆35Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 3 years ago
- ☆24Updated last year
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- ☆78Updated 2 months ago
- CTF writeups☆30Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆61Updated last year
- ☆26Updated 3 years ago
- My CTF writeups☆26Updated 3 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- Scripts I used during CTP☆67Updated 4 years ago
- Official training ground for the OTA CTF team☆39Updated 2 years ago
- ☆16Updated 8 years ago
- Our team's CTF writeups☆10Updated 5 years ago
- CTF binary exploit code☆38Updated 6 years ago
- ☆36Updated 6 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆20Updated 3 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- Simple vulnerability scanning framework☆50Updated 8 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated last year
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- ☆23Updated 3 months ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago