YZloser / My-CTF-ChallengesView external linksLinks
My-CTF-Challenges
☆15Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for My-CTF-Challenges
Users that are interested in My-CTF-Challenges are comparing it to the libraries listed below
Sorting:
- ☆14Sep 26, 2021Updated 4 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- linux kernel cross page attack demo module☆31Mar 15, 2023Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆11Mar 8, 2022Updated 3 years ago
- ☆15Nov 27, 2023Updated 2 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆32Updated this week
- ☆103Mar 8, 2022Updated 3 years ago
- ☆16Jun 23, 2024Updated last year
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- ☆39Jun 6, 2024Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆42Aug 3, 2021Updated 4 years ago
- 设备射频信号原始数据☆19Sep 28, 2018Updated 7 years ago
- ☆16Jun 9, 2023Updated 2 years ago
- ☆20Jul 27, 2020Updated 5 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 3 years ago
- Automated recovery of Linux kernel build configurations☆25Jan 14, 2022Updated 4 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 4 months ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 2 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆29Aug 17, 2023Updated 2 years ago
- Collection of CTF Web challenges I made☆53Apr 25, 2023Updated 2 years ago
- ☆28Feb 3, 2022Updated 4 years ago
- PoC code for CVE-2019-14040☆27Apr 15, 2020Updated 5 years ago
- ☆60Sep 27, 2023Updated 2 years ago
- ☆26May 10, 2021Updated 4 years ago
- ☆31Feb 20, 2022Updated 3 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- nanoMIPS IDA plugin☆68Sep 15, 2021Updated 4 years ago
- ☆177Jun 18, 2023Updated 2 years ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Jul 25, 2019Updated 6 years ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago