fareedfauzi / Flare-On-ChallengesLinks
This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.
☆362Updated 7 months ago
Alternatives and similar repositories for Flare-On-Challenges
Users that are interested in Flare-On-Challenges are comparing it to the libraries listed below
Sorting:
- Windows Pwnable Study☆385Updated 4 months ago
- ☆173Updated 3 years ago
- My notes on pwn☆289Updated 2 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- Assortment of hashing algorithms used in malware☆384Updated 2 weeks ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆640Updated 8 months ago
- The FLARE team's open-source extension to add Python 3 scripting to Ghidra.☆766Updated last year
- ☆113Updated last year
- knowledge is power☆229Updated 3 months ago
- Research notes☆129Updated 11 months ago
- Analyze Golang with Ghidra☆188Updated 3 weeks ago
- Python Command-Line Ghidra Binary Diffing Engine☆709Updated last month
- ☆199Updated 7 years ago
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago
- A Binary Genetic Traits Lexer Framework☆516Updated 3 months ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87Updated 2 years ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆464Updated 2 years ago
- Write-ups for various CTF☆199Updated 2 months ago
- A collection of pwn/CTF related utilities for Ghidra☆696Updated last year
- Comprehensive toolkit for Ghidra headless.☆362Updated 6 months ago
- HashDB API hash lookup plugin for IDA Pro☆339Updated last month
- A full English version of the popular ctf-wiki☆104Updated last year
- The US Cyber Games 2022 Open CTF was a collaborative effort to test competitors in pwn, crypto, reverse engineering, forensics, and web c…☆29Updated 3 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆884Updated last year
- Source code for the DEF CON 30 CTF Qualifiers.☆266Updated last year
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆238Updated last year
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆228Updated last year
- Reverse Engineering challenges☆36Updated 4 years ago
- Code snips and notes☆137Updated 3 years ago
- ASLR bypass without infoleak☆163Updated 4 years ago