My CTF writeups
☆27Jul 22, 2021Updated 4 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Repository for all documentation written about tools hosted at github.com/containers☆13Mar 29, 2023Updated 2 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- ☆21Nov 3, 2018Updated 7 years ago
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- ☆20Feb 28, 2018Updated 8 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆75Oct 18, 2018Updated 7 years ago
- A fork version of lldbinit https://github.com/gdbinit/lldbinit☆44Aug 16, 2025Updated 6 months ago
- Extreme Vulnerable IOKit driver☆93Jan 23, 2021Updated 5 years ago
- ☆27Jan 8, 2026Updated last month
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- ☆26Mar 12, 2020Updated 5 years ago
- ☆24Feb 2, 2026Updated last month
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- A Pwning Toolkit☆28Jan 11, 2025Updated last year
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- ☆11Sep 20, 2022Updated 3 years ago
- Source Code - https://github.com/USStateDept/State-TalentMAP☆13Sep 12, 2023Updated 2 years ago
- You can check credits card whether they are cvv or ccn or dead using sk keys.☆10Sep 20, 2022Updated 3 years ago
- ☆20Nov 29, 2023Updated 2 years ago
- ☆35Dec 2, 2018Updated 7 years ago
- ☆29Sep 18, 2015Updated 10 years ago
- Exploiting challenges in Linux and Windows☆121Dec 22, 2019Updated 6 years ago
- ☆31Jun 18, 2020Updated 5 years ago
- PE file mapping and manipulation package.☆36May 6, 2022Updated 3 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- ☆19May 2, 2024Updated last year
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Dec 8, 2025Updated 2 months ago