TowerofHanoi / CTFsubmitter
A flag submitter service with distributed attackers for attack/defense CTF games.
☆73Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for CTFsubmitter
- A tool for finding the one gadget RCE in libc☆74Updated 4 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- Collection of scripts and writeups☆320Updated 2 years ago
- Wiki-like CTF write-ups repository by ByteBandits☆101Updated last year
- ☆151Updated 2 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 2 weeks ago
- Some new commands debug heap for peda☆98Updated 4 years ago
- A happy heap editor to support your exploitation process☆194Updated 3 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆138Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- ☆45Updated last year
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆66Updated 7 years ago
- Upcoming list of ctfs directly in your terminal!☆16Updated last year
- Repository with the material of the Tower of Hanoi introductory briefings on binary exploitation☆23Updated 8 years ago
- ☆107Updated 4 years ago
- A fuzzing framework for network servers☆118Updated 6 years ago
- FAUST Gameserver for attack-defense CTFs☆67Updated last month
- A pip wrapper around AFL.☆84Updated 3 years ago
- TCP flow analyzer with sugar for A/D CTF☆138Updated last year
- ☆86Updated 6 years ago
- Linux Heap Exploitation Practice☆377Updated 5 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.☆143Updated last year
- ☆88Updated 5 years ago
- Some CTF write up☆240Updated 2 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆179Updated 9 years ago
- Code and exercises for a workshop on z3 and angr☆222Updated 3 years ago