alaadotsol / forthectfLinks
A library of tools I assembled from various sources in preparation for the REDEYE hack night ctf
☆50Updated last month
Alternatives and similar repositories for forthectf
Users that are interested in forthectf are comparing it to the libraries listed below
Sorting:
- ☆14Updated 5 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆59Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Where CTFs happen☆81Updated last year
- Short writeups/solvers for interesting CTF challenges.☆17Updated 2 years ago
- CTFs I've played so far☆17Updated 7 months ago
- Binary & scripts associated with "The Poor Man's Obfuscator" presentation☆228Updated 3 years ago
- A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python…☆139Updated 2 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- My Personal Reading lists for CVE Writeups☆36Updated 3 years ago
- redpwn's challenge deployment system☆28Updated last year
- SSD Challenges☆47Updated 2 years ago
- Another linux ELF packer to evade hash detection.☆35Updated 3 years ago
- Community provided themes for the reverse engineering tool Binary Ninja☆62Updated 4 months ago
- ☆13Updated 6 years ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Our team's CTF writeups☆12Updated 5 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 3 months ago
- ☆29Updated 2 years ago
- CVE-2021-3707 , CVE-2021-3708☆20Updated 3 years ago
- Make your Ghidra Lazy!☆153Updated 5 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Solutions to some crackmes that I have done.☆71Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆118Updated 10 months ago
- ☆82Updated 7 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆72Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆226Updated 2 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Updated 2 years ago