These are the write up of b3f0re and offical to study
☆22Dec 13, 2022Updated 3 years ago
Alternatives and similar repositories for Write-up
Users that are interested in Write-up are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- about study java☆17Jun 12, 2023Updated 2 years ago
- Code of Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices (NDSS 2025)☆24Apr 11, 2025Updated 11 months ago
- SUSCTF2022 Official Writeup☆46Mar 5, 2022Updated 4 years ago
- ☆37May 11, 2022Updated 3 years ago
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21May 20, 2020Updated 5 years ago
- BrowserAgent: Building Web Agents with Human-Inspired Web Browsing Actions [TMLR2025]☆30Jan 13, 2026Updated 2 months ago
- CTF题目缓存(题目信息及附件),用于题目复现和学习☆334Oct 27, 2021Updated 4 years ago
- An IDA processor for eBPF bytecode☆52Oct 13, 2021Updated 4 years ago
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- ☆18Nov 6, 2024Updated last year
- 在线cms识别|旁站|c段|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..☆10Apr 23, 2019Updated 6 years ago
- ☆15Mar 14, 2023Updated 3 years ago
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆34Jun 16, 2022Updated 3 years ago
- A tool for unpacking and repackaging PyInstaller applications☆12Feb 3, 2025Updated last year
- ☆26Apr 29, 2017Updated 8 years ago
- ☆227Dec 9, 2020Updated 5 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆34Mar 12, 2026Updated last week
- 基于pwntools+angr的简单CTF AMD64 PWN AUTO FUZZ☆54Dec 26, 2024Updated last year
- DUMB: An Example Architecture for Binary Ninja☆16Mar 1, 2020Updated 6 years ago
- ☆25Jul 19, 2024Updated last year
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- 一个简易的AWD攻击框架,希望对于该项目大家有更好的建议和改进!☆16Jun 6, 2022Updated 3 years ago
- Windows Security Resources☆74Jan 14, 2022Updated 4 years ago
- Android第一代加壳技术☆11May 17, 2021Updated 4 years ago
- A statically built version of the strace tool for android (aarch64)☆13Mar 5, 2021Updated 5 years ago
- DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing☆11Feb 28, 2023Updated 3 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆33Mar 3, 2024Updated 2 years ago
- Recovers/brute forces the key for PHP files protected with PHP Screw☆14Oct 28, 2019Updated 6 years ago
- ☆10Apr 27, 2024Updated last year
- Sudoku Solver using Z3☆19Jan 23, 2020Updated 6 years ago
- Collections of student projects to find execution path in binary program via taint analysis using Ghidra☆17Sep 25, 2022Updated 3 years ago
- ☆109Nov 11, 2023Updated 2 years ago
- A pwn learning repo containing multiple pwn program codes.☆35Mar 11, 2026Updated 2 weeks ago
- ☆63Dec 27, 2025Updated 2 months ago
- 自动检测ctf中的图片隐写☆36Apr 22, 2023Updated 2 years ago
- Official source code and writeups of *CTF2022☆75Apr 19, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year