braindead / ctf-writeupsLinks
My CTF writeups
☆13Updated 5 years ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- Interactive Redundant Assembler (shell)☆96Updated 6 years ago
- Function redirection via ELF tricks.☆163Updated 10 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Updated 8 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆380Updated 7 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆182Updated 11 years ago
- Linux Heap Exploitation Practice☆395Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆152Updated 6 years ago
- Reversing list☆150Updated 2 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- Package Binary Code as a Python class using Binary Ninja and Unicorn Engine☆409Updated 3 years ago
- Samples of binary with different formats and architectures. A test suite for your binary analysis tools.☆275Updated 7 years ago
- Here records some tips about pwn.☆12Updated 4 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆145Updated 6 years ago
- Daenerys: A framework for interoperability between IDA and Ghidra☆307Updated 6 years ago
- ☆111Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- Cream of the Crop Pwning Challenges☆32Updated 6 years ago
- Exploitation and Mitigation Slides☆135Updated last year
- Just another (unfinished) kernel from scratch...☆47Updated 3 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆389Updated 3 years ago
- A flag submitter service with distributed attackers for attack/defense CTF games.☆71Updated 6 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆26Updated 8 years ago
- ☆174Updated 3 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- gdbghidra - a visual bridge between a GDB session and GHIDRA☆325Updated 6 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago
- Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.☆138Updated last year
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆343Updated 6 years ago