fuzyll / defcon-vm
Files from my DEFCON CTF VM.
☆269Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for defcon-vm
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆225Updated this week
- A repository of challenges from various CTF competitions.☆154Updated 10 years ago
- ☆278Updated 4 years ago
- BSidesSF CTF 2017 release☆126Updated 2 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆446Updated 9 years ago
- CTF Writeups☆186Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆180Updated 8 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆356Updated 5 years ago
- Repository to train/learn memory corruption on the ARM platform.☆352Updated 7 years ago
- Documentation for the Mechanical Phish.☆231Updated 8 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 3 years ago
- The first open source vulnerability scanner for firmwares☆193Updated 8 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆296Updated last year
- Linux bind shell with anti-reverse engineering techniques☆283Updated 7 years ago
- Repo for CSAW CTF 2016 Quals challenges☆73Updated 8 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆328Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2013☆229Updated 8 years ago
- A tool to help you write binary exploits☆604Updated 5 years ago
- Conference slides and White-papers☆356Updated 4 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Teach you a binary exploitation for great good.☆294Updated 6 years ago
- Fancy Bear Source Code☆260Updated 7 years ago