firmianay / Life-long-Learner
Personal Notes About Everything.
☆449Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Life-long-Learner
- For Linux binary Exploitation☆818Updated 6 years ago
- My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.☆528Updated 3 months ago
- A Course on Intermediate Level Linux Exploitation☆987Updated 4 years ago
- Linux Binary Exploitation☆1,304Updated 3 years ago
- (与本人兴趣强相关的)各种安全or计算机资料收集☆731Updated 2 years ago
- Contains Attack labs☆151Updated 5 years ago
- Tutorials for getting started with Pwntools☆1,405Updated last month
- gdb for pwn☆892Updated 3 months ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆519Updated 2 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆211Updated last year
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆401Updated last year
- CTF writeups from Balsn☆474Updated 2 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,740Updated 5 years ago
- Provide powerful tools for seccomp analysis☆987Updated 3 weeks ago
- Writeups/solutions☆95Updated 4 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆640Updated last week
- Writeup for picoCTF 2018☆125Updated 2 years ago
- Some CrackMe codes for Linux x86/x86_64☆348Updated last year
- a series tutorial for linux exploit development to newbie.☆554Updated 7 months ago
- A docker environment for pwn in ctf☆744Updated last year
- CTF write-ups by Plaid Parliament of Pwning☆774Updated 5 months ago
- Challenges for Binary Exploitation Workshop☆594Updated 2 years ago
- Some pwn challenges selected for training and education.☆379Updated last year
- This Repository aims at giving a basic idea about Kernel Exploitation.☆501Updated 4 months ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,242Updated 2 years ago
- An archive of low-level CTF challenges developed over the years☆609Updated 2 years ago
- CTF Reversing Challenges List☆270Updated 5 years ago
- A collection of resources for linux reverse engineering☆1,994Updated 2 years ago
- An in depth tutorial on how to do binary exploitation☆450Updated 6 years ago
- This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the p…☆1,024Updated 2 years ago