dqi / ctf_writeup
☆34Updated 2 years ago
Alternatives and similar repositories for ctf_writeup:
Users that are interested in ctf_writeup are comparing it to the libraries listed below
- Helper script for working with format string bugs☆57Updated 4 years ago
- Source for some problems from PlaidCTF 2014.☆57Updated 10 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago
- Simple shellcode testing tool.☆48Updated 12 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆47Updated 8 years ago
- A simple steganalysis script writen in Python☆26Updated 11 years ago
- Writeups for CTF competitions.☆32Updated 8 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- Exploits for interesting CTF challenges I have worked on☆64Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- Some stuffs for CODE BLUE 2016☆21Updated 8 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Solutions for my 34C3CTF challenges☆21Updated 6 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆43Updated 7 years ago
- Source code for building an exploitable linux kernel challenge iso.☆44Updated 11 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Updated 5 years ago
- exploit development☆49Updated 6 years ago
- various CTF writeups☆60Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- ☆44Updated 6 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 5 years ago
- Linux local root exploit for CVE-2014-0038☆192Updated 10 years ago
- PoC for Foxit Reader CVE-2018-14442☆58Updated 6 years ago
- ☆49Updated 7 years ago
- ☆19Updated 10 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 6 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Updated 7 years ago