alaadotsol / forthectfLinks
A library of tools I assembled from various sources in preparation for the REDEYE hack night ctf
☆50Updated 3 months ago
Alternatives and similar repositories for forthectf
Users that are interested in forthectf are comparing it to the libraries listed below
Sorting:
- Solutions to some crackmes that I have done.☆71Updated 3 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆59Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Community provided themes for the reverse engineering tool Binary Ninja☆66Updated 6 months ago
- Short writeups/solvers for interesting CTF challenges.☆17Updated 3 years ago
- SSD Challenges☆48Updated 3 years ago
- Where CTFs happen☆83Updated last year
- Binary & scripts associated with "The Poor Man's Obfuscator" presentation☆229Updated 3 years ago
- redpwn's challenge deployment system☆28Updated last year
- Another linux ELF packer to evade hash detection.☆35Updated 4 years ago
- ☆13Updated 7 years ago
- ☆14Updated 5 years ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- CTFs I've played so far☆17Updated 9 months ago
- Our team's CTF writeups☆12Updated 5 years ago
- ☆82Updated 8 years ago
- Initiative to collect and preserve crackmes for learning and practice in reverse engineering☆114Updated 4 years ago
- Open repository of binary sample collections for binary analysis.☆16Updated 4 years ago
- A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python…☆142Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- My Personal Reading lists for CVE Writeups☆37Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆14Updated 4 years ago
- qiling framework examples☆16Updated 3 years ago
- Make your Ghidra Lazy!☆154Updated 5 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆233Updated 2 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- ☆64Updated last year
- Anti-reverse Compilation☆34Updated 4 years ago