☆92Aug 18, 2024Updated last year
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- ☆72Nov 27, 2018Updated 7 years ago
- Watching the Flag☆15Dec 16, 2015Updated 10 years ago
- Interactive Virtual Machine Introspection☆18Sep 27, 2017Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Full TrustZone exploit for MSM8974☆142Jan 24, 2016Updated 10 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 8 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 6 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- Wiki-like CTF write-ups repository by ByteBandits☆102Sep 21, 2025Updated 5 months ago
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- ☆280May 21, 2020Updated 5 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago