duc-le / ctf-writeupsLinks
CTF Writeups
☆10Updated 9 years ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- Practice and learning in the world of C RE and exploit analysis☆33Updated 8 years ago
- ☆15Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Updated 9 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Proof-of-Concept code for exploits☆81Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 7 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- ☆43Updated 7 years ago
- ☆96Updated 7 years ago
- Information Security News☆62Updated 2 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Updated 10 years ago
- quals-2014☆21Updated 11 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- Source for some problems from PlaidCTF 2014.☆58Updated 11 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 6 years ago
- Automatic collect firmwares from internet,decompress,find binary code,extract info,file relation and function relation☆40Updated 8 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 9 years ago
- A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous☆40Updated 9 years ago
- Radare 2 wiki☆93Updated 5 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Updated 4 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago