chksum0 / writeupsLinks
CTF Writeups
☆23Updated 7 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- CTF Finals☆17Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- ☆49Updated 7 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 3 years ago
- Block-based software vulnerability fuzzing framework☆49Updated 6 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 7 years ago
- Memory awesomeness.☆29Updated 10 years ago
- A x86 systematic ROP payload generation☆57Updated 5 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Binary Analysis Platform☆74Updated 11 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- ☆26Updated 7 years ago
- ☆29Updated 7 years ago
- ctf writeups☆19Updated 6 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- ☆34Updated 9 years ago