Exploits for interesting CTF challenges I have worked on
☆63Mar 1, 2017Updated 9 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- ☆81Jun 12, 2017Updated 8 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Writeups for CTF competitions.☆33May 24, 2016Updated 9 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 9 years ago
- PoCs/Examples for my guest post on doar-e☆19Nov 27, 2014Updated 11 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- my public code☆167Jan 11, 2017Updated 9 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- ☆17May 13, 2019Updated 6 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆51Feb 9, 2026Updated 2 weeks ago
- Universal Trace Debugger Engine. Currently, only support windbg on Windows, but the long term goal is to also support GDB or LLDB☆13Dec 30, 2013Updated 12 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆507May 11, 2021Updated 4 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- CTF Writeups☆190Oct 8, 2017Updated 8 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- A static Internet Explorer Fuzzer.☆50Jun 15, 2017Updated 8 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago