ViRb3 / z3-python-ctf
🐍 Solving CTF challenges using Z3 and Python
☆52Updated last year
Alternatives and similar repositories for z3-python-ctf:
Users that are interested in z3-python-ctf are comparing it to the libraries listed below
- ☆159Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆100Updated last year
- ☆45Updated last year
- ASLR bypass without infoleak☆159Updated 3 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆107Updated 2 months ago
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆54Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆38Updated last year
- ☆45Updated 6 years ago
- Where CTFs happen☆80Updated 7 months ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆29Updated last year
- Udemy – Linux Heap Exploitation☆35Updated 3 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- visualizing CTF clusters (teams playing together at DEFCON)☆27Updated last year
- Source code and solution of CTF challenges that I created.☆45Updated 7 months ago
- ☆36Updated last year
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆48Updated last year
- Collection of browser challenges☆120Updated 3 years ago
- CTF writeups from The Flat Network Society☆130Updated last week
- Leveraging patch diffing to discover new vulnerabilities☆109Updated 2 months ago
- An intuitive query API for IDA Pro☆152Updated 2 weeks ago
- ☆74Updated 8 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆61Updated 6 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆69Updated 2 weeks ago
- Writeups of some Reverse Engineering challenges in CTFs I played☆30Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆96Updated 4 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆80Updated last year
- Challenges and write-ups for GCC-CTF 2024☆19Updated 10 months ago
- A GDB+GEF-style debugger for unloading Python pickles☆62Updated 2 weeks ago
- A full English version of the popular ctf-wiki☆83Updated 6 months ago