apuigsech / vagrant-ctfLinks
Vagrant files to bootstrap VM for CTFs
☆11Updated 8 years ago
Alternatives and similar repositories for vagrant-ctf
Users that are interested in vagrant-ctf are comparing it to the libraries listed below
Sorting:
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 3 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- Fuzzer☆43Updated 10 years ago
- ☆26Updated 8 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- ☆44Updated 6 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- ☆21Updated 6 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Updated 8 years ago
- The ultimate tool to crafting your ARM shell code☆10Updated 9 years ago
- js-beautifier extension for Burp Suite☆30Updated 11 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 9 years ago
- A Modern Approach☆10Updated 9 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- Format string exploit generation☆10Updated 9 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- quals-2014☆22Updated 10 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago