farazsth98 / CTFLinks
CTF solve scripts. Some writeups on my blog, others on my gist. Check the challenge directories for links.
☆10Updated last year
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- ☆12Updated 2 years ago
- ☆12Updated last year
- ☆10Updated 4 years ago
- The Manticore User Interface with plugins for Binary Ninja and Ghidra☆75Updated last year
- Fuzzing campaign for https://github.com/drips-network/contracts☆10Updated last month
- Collection of Web3 Audits and Publications by ChainLight of Theori☆14Updated 2 years ago
- An educational toy fuzzer with big dreams☆12Updated last year
- ☆13Updated 2 years ago
- ☆10Updated 2 years ago
- ☆11Updated 3 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Practical fuzzing tutorials and training☆30Updated last year
- single file ctf/exploit client library - python3, type annotated☆70Updated 2 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Updated 5 years ago
- A general purpose foundation for cloud-based fuzzing and mutation testing jobs☆21Updated last year
- ☆36Updated 4 years ago
- Differential fuzzing for Smart Contract VMs☆51Updated 3 years ago
- ☆12Updated 8 years ago
- RealWorld CTF 5th realwrap challenge☆18Updated 2 years ago
- About as basic of a mutator as you can get, but it does the trick in most situations☆64Updated 5 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- pwntools library implementation in c++☆48Updated 4 years ago
- ☆68Updated last year
- Repo for storing CTF related stuff (Writeups, etc.)☆52Updated last year
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Updated 4 years ago
- ethpwn - the Swiss Army Knife for Smart Contract Hacking☆54Updated last week
- ☆39Updated last year
- ☆37Updated 2 years ago