ctfhacker / ctf-writeups
☆89Updated 7 months ago
Alternatives and similar repositories for ctf-writeups:
Users that are interested in ctf-writeups are comparing it to the libraries listed below
- GUI tool to create ROP chains using the ropper API☆156Updated 6 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆89Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 6 years ago
- CTF writeups☆112Updated 7 years ago
- Repo for CSAW CTF 2016 Quals challenges☆73Updated 8 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆140Updated 6 years ago
- ☆82Updated 7 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 4 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- SHURIKEN: Exploit throwing framework☆36Updated 9 years ago
- various CTF writeups☆60Updated 6 years ago
- ☆72Updated 6 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- PoC for CVE-2015-6086☆68Updated 8 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- Setup for a pwning VM☆60Updated 6 years ago
- Exploits for interesting CTF challenges I have worked on☆64Updated 8 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆71Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- IDA cLEMENCy Tools☆61Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- A collection of more than 1000 binary libc files☆87Updated 9 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- ☆85Updated 4 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- Wadi Fuzzing Harness☆127Updated 8 years ago