ctf-x / ctfx-problems-2016
CTF(x) 2016 problem statements, files, and writeups
☆16Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for ctfx-problems-2016
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆43Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆55Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 8 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆34Updated 6 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 6 years ago
- ☆32Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated 10 months ago
- Capture-The-Flag(CTF) toolkit☆11Updated 9 years ago
- ☆28Updated 7 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 7 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago
- ☆44Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 5 years ago
- Challenge for the 33C3 CTF☆15Updated 7 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- My fuzzing workshop from PHDays9☆27Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Updated 8 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Updated 6 years ago
- ☆13Updated 6 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated 10 months ago
- ☆13Updated 5 years ago