chksum0 / writeupsLinks
CTF Writeups
☆23Updated 7 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- ☆91Updated last year
- Collection of software bugs found by SkyLined☆68Updated 9 years ago
- CTF writeups☆113Updated 8 years ago
- Library for creating CTF services.☆75Updated 9 years ago
- ☆24Updated 9 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆62Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Automated Exploit generation with WinDBG☆191Updated 9 years ago
- ☆49Updated 7 years ago
- windows kernel vulnerability found by me☆90Updated 8 years ago
- ☆72Updated 6 years ago
- ☆85Updated 5 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆56Updated 10 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- Exploits for interesting CTF challenges I have worked on☆65Updated 8 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆142Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆158Updated 7 years ago
- ☆137Updated 4 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- PoC for CVE-2015-6086☆67Updated 9 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 7 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Updated 7 years ago
- CTF Finals☆17Updated 8 years ago
- Hodor! Fuzzer..☆129Updated 9 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Updated 8 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 9 years ago