brian020305 / Christmas-CTFLinks
Open-CTF based on Christmas CTF Platform
☆11Updated 9 years ago
Alternatives and similar repositories for Christmas-CTF
Users that are interested in Christmas-CTF are comparing it to the libraries listed below
Sorting:
- black hat Asia 2017 Slides☆22Updated 8 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago
- A Modern Approach☆10Updated 9 years ago
- Android malware static & dynamic analysis and automated action (deprecated)☆21Updated 4 years ago
- finals-2014☆20Updated 8 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- ☆13Updated 8 years ago
- quals-2014☆21Updated 10 years ago
- ☆12Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- CVE-2016-3141☆15Updated 9 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- ☆43Updated 7 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- (mostly web related) web challenge writeups between 2011 and 2015☆22Updated 2 years ago
- Some setup scripts for security research tools.☆10Updated 10 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆38Updated 10 years ago
- Vagrant files to bootstrap VM for CTFs☆11Updated 8 years ago
- Ptcoresec jeopardy style scoreboard☆23Updated 13 years ago
- Capture-The-Flag(CTF) toolkit☆11Updated 10 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Updated 9 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆38Updated 8 years ago
- ☆44Updated 10 years ago
- Break Apps with Frida workshop material☆45Updated 7 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago