Files from my DEFCON CTF VM.
☆273Sep 6, 2016Updated 9 years ago
Alternatives and similar repositories for defcon-vm
Users that are interested in defcon-vm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- Tools, documentation and test inputs for fuzzing opensource projects with AddressSanitizer and friends.☆29Sep 24, 2015Updated 10 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- binary patching from Python☆638Jul 6, 2023Updated 2 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 10 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- ☆280May 21, 2020Updated 5 years ago
- Deprecated Binary Ninja prototype written in Python☆525Oct 1, 2020Updated 5 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,002Aug 27, 2022Updated 3 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 7 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 11 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- AFL/QEMU fuzzing with full-system emulation.☆642Sep 9, 2018Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆81Jun 12, 2017Updated 8 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Some helpful preload libraries for pwning stuff.☆1,648Mar 6, 2026Updated 2 months ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Automated Exploit generation with WinDBG☆192Oct 18, 2016Updated 9 years ago
- Cross debugger suite☆20Jul 9, 2021Updated 4 years ago
- Modern Memory Safety in C/C++☆1,218Aug 1, 2016Updated 9 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- CTF write-ups by Plaid Parliament of Pwning☆808Jun 4, 2024Updated last year
- Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)☆141Jan 4, 2017Updated 9 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Linux bind shell with anti-reverse engineering techniques☆295Feb 9, 2017Updated 9 years ago