These are the write up of b3f0re and offical to study
☆22Dec 13, 2022Updated 3 years ago
Alternatives and similar repositories for Write-up
Users that are interested in Write-up are comparing it to the libraries listed below
Sorting:
- about study java☆17Jun 12, 2023Updated 2 years ago
- Muti-threading version of Finger☆32Apr 8, 2024Updated last year
- 用于备份CTF比赛题目,仅队内复现使用☆15Apr 17, 2022Updated 3 years ago
- Sudoku Solver using Z3☆19Jan 23, 2020Updated 6 years ago
- SUSCTF2022 Official Writeup☆46Mar 5, 2022Updated 3 years ago
- 基于pwntools+angr的简单CTF AMD64 PWN AUTO FUZZ☆54Dec 26, 2024Updated last year
- Writeups By Straw Hat☆54Dec 14, 2023Updated 2 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- ☆24Sep 13, 2022Updated 3 years ago
- CTF题目缓存(题目信息及附件),用于题目复现和学习☆333Oct 27, 2021Updated 4 years ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆32Mar 3, 2024Updated 2 years ago
- 自动检测ctf中的图片隐写☆36Apr 22, 2023Updated 2 years ago
- ☆64Nov 26, 2021Updated 4 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- Challenge source code and deployment scripts for UIUCTF 2022☆32Aug 9, 2022Updated 3 years ago
- ☆37May 11, 2022Updated 3 years ago
- 2020羊城杯官方writeup及源码☆33Dec 7, 2020Updated 5 years ago
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆34Jun 16, 2022Updated 3 years ago
- 一个用于暴力破解猫变换(Arnold's Cat Map)加密图像的命令行工具。☆26Dec 21, 2025Updated 2 months ago
- ☆11Sep 6, 2024Updated last year
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- EagleEye: Transformer-based malware detection - https://ieeexplore.ieee.org/document/10896250☆16Mar 12, 2025Updated 11 months ago
- ☆14Mar 10, 2025Updated 11 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- ☆33Nov 16, 2020Updated 5 years ago
- ☆62Dec 27, 2025Updated 2 months ago
- Uncovering Container Confusion in the Linux Kernel☆46Feb 27, 2024Updated 2 years ago
- ☆12Nov 21, 2022Updated 3 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Popular with WEP/Used in DC Darknet badge -- simple implementations that will ultimately be used in attacking the badge.☆14Sep 22, 2015Updated 10 years ago
- A framework for lifting ARM32 to LLVM-IR and merging resulting code with LLVM-IR generated from source-code.☆12Oct 20, 2022Updated 3 years ago
- Android第一代加壳技术☆11May 17, 2021Updated 4 years ago
- Gigabyte C246 WU4 OpenCore EFI☆10May 2, 2021Updated 4 years ago
- This application attempts to detect android overlay attacks☆45Aug 8, 2023Updated 2 years ago
- fork from A-Protect☆10Nov 26, 2018Updated 7 years ago
- ☆10Apr 27, 2024Updated last year