Wiki-like CTF write-ups repository, maintained by the community. 2016
☆20Feb 10, 2025Updated last year
Alternatives and similar repositories for write-ups-2016
Users that are interested in write-ups-2016 are comparing it to the libraries listed below
Sorting:
- Pwn2Win CTF 2017☆27Nov 1, 2017Updated 8 years ago
- Nmap enumeration and script scan automation script☆38Mar 7, 2023Updated 2 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- ☆15Oct 9, 2021Updated 4 years ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 4 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Pwn2Win CTF 2019 flag submissions☆14May 28, 2020Updated 5 years ago
- Open-CTF based on Christmas CTF Platform☆11Feb 25, 2016Updated 10 years ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- Platform Test Edition☆17Mar 11, 2018Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 10 years ago
- A command line Swiss army knife for string and number conversions☆18Updated this week
- ☆17Jun 3, 2025Updated 8 months ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ELT write-ups repository.☆40Jan 31, 2023Updated 3 years ago
- Patching Flash binary to stop Flash exploits and zero-days☆62Apr 18, 2017Updated 8 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- Extract LZMA sections from cable modem firmware images☆20Nov 18, 2013Updated 12 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Aug 26, 2013Updated 12 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- ☆17Jan 3, 2021Updated 5 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- Public repository to provide guidance and examples for people to start learning IaC. This repository also contains some open-hack style l…☆23Jun 14, 2023Updated 2 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago