alaadotsol / forthectfLinks
A library of tools I assembled from various sources in preparation for the REDEYE hack night ctf
☆50Updated this week
Alternatives and similar repositories for forthectf
Users that are interested in forthectf are comparing it to the libraries listed below
Sorting:
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- Community provided themes for the reverse engineering tool Binary Ninja☆63Updated 2 months ago
- Make your Ghidra Lazy!☆153Updated 4 years ago
- CVE-2021-3707 , CVE-2021-3708☆20Updated 3 years ago
- Short writeups/solvers for interesting CTF challenges.☆17Updated 2 years ago
- A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python…☆137Updated 2 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆58Updated 5 years ago
- redpwn's challenge deployment system☆28Updated last year
- Solutions to some crackmes that I have done.☆70Updated 2 years ago
- ☆14Updated 5 years ago
- Another linux ELF packer to evade hash detection.☆35Updated 3 years ago
- CTFs I've played so far☆17Updated 6 months ago
- Assembly language files and Shellcode☆34Updated 4 years ago
- My Personal Reading lists for CVE Writeups☆36Updated 3 years ago
- Initiative to collect and preserve crackmes for learning and practice in reverse engineering☆111Updated 3 years ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Where CTFs happen☆81Updated last year
- ☆84Updated 7 years ago
- Binary & scripts associated with "The Poor Man's Obfuscator" presentation☆228Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 2 months ago
- GPU-accelerated ascii art generator with subpixel rendering☆18Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆228Updated 2 years ago
- ☆120Updated 5 years ago
- SSD Challenges☆47Updated 2 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Updated 2 years ago
- ☆28Updated 2 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆79Updated 8 years ago