My-CTF-Challenges
☆15Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for My-CTF-Challenges
Users that are interested in My-CTF-Challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆35Dec 23, 2025Updated 3 months ago
- ☆14Sep 26, 2021Updated 4 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- Collection of CTF Web challenges I made☆53Apr 25, 2023Updated 2 years ago
- ☆16Sep 27, 2021Updated 4 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- ☆103Mar 8, 2022Updated 4 years ago
- ☆39Jun 6, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- ☆15Nov 27, 2023Updated 2 years ago
- ☆16Jun 9, 2023Updated 2 years ago
- javaDeserializeLabs☆70Apr 18, 2023Updated 2 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 3 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 3 years ago
- ☆16Jun 23, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 5 months ago
- attachments for forum of RealWorld CTF 3rd☆42Jan 7, 2021Updated 5 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆43Aug 3, 2021Updated 4 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆34Mar 6, 2026Updated 3 weeks ago
- headless-ida-mcp-server☆37Apr 4, 2025Updated 11 months ago
- ☆60Sep 27, 2023Updated 2 years ago
- nanoMIPS IDA plugin☆68Sep 15, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- ☆12Aug 22, 2022Updated 3 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- 设备射频信号原始数据☆19Sep 28, 2018Updated 7 years ago