Exploits for interesting CTF challenges I have worked on
☆63Mar 1, 2017Updated 9 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆81Jun 12, 2017Updated 8 years ago
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- Writeups for CTF competitions.☆33May 24, 2016Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆140Jan 4, 2017Updated 9 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- my public code☆166Jan 11, 2017Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 8 years ago
- ☆17May 13, 2019Updated 6 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- An interactive memory info for pwning / exploiting☆98Apr 13, 2023Updated 2 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 10 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- PoCs/Examples for my guest post on doar-e☆19Nov 27, 2014Updated 11 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- python library to examine ptmalloc (the glibc userland heap implementation)☆509May 11, 2021Updated 4 years ago
- Perl wrapper for the capstone library☆13Mar 7, 2017Updated 9 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- Simple binary file disassembler based on libopcodes and bfd from binutils.☆27Jun 25, 2015Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 4 months ago
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 3 months ago