fkt / 36c3-junior-ctf-pub
☆23Updated 5 years ago
Alternatives and similar repositories for 36c3-junior-ctf-pub:
Users that are interested in 36c3-junior-ctf-pub are comparing it to the libraries listed below
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- ☆91Updated 3 years ago
- 35C3 Junior CTF pwnables☆148Updated 6 years ago
- ☆100Updated 6 years ago
- ☆52Updated 5 years ago
- ☆88Updated 6 years ago
- Challenges from CSAW 2019 Pwn Race Edition☆12Updated 5 years ago
- A web UI and server for task based competitions employing Etherpad Lite.☆109Updated 5 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- CTF write-ups / solution scripts☆23Updated 6 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 2 years ago
- ☆49Updated 4 years ago
- justCTF 2019 challenges sources☆37Updated 3 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 5 months ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Tool to test different CTF scoring algorithms on real data☆17Updated 3 years ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆18Updated 5 years ago
- 34C3 Junior CTF pwnables☆116Updated 6 years ago
- Challenges for INShAck 2018☆25Updated 5 years ago
- ☆13Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆20Updated 5 years ago
- Repository for Insomni'hack finals 2015☆22Updated 9 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆27Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Automatic Vulnerability Discovery☆37Updated 5 years ago
- ☆30Updated 6 years ago