chrysh / ctf_writeupsLinks
☆25Updated 6 years ago
Alternatives and similar repositories for ctf_writeups
Users that are interested in ctf_writeups are comparing it to the libraries listed below
Sorting:
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- ☆16Updated 6 years ago
- ☆49Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆25Updated 9 years ago
- Personal repository for all ctf related stuffs☆67Updated 6 months ago
- Binary Ninja Posters☆35Updated 4 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- ☆33Updated 8 years ago
- Setup for a pwning VM☆61Updated 6 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- Radare 2 wiki☆92Updated 5 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- ☆72Updated 6 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- STAN is a sTAtic aNalyser☆39Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆155Updated 7 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- POLAR☆73Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago