Files from my DEFCON CTF VM.
☆273Sep 6, 2016Updated 9 years ago
Alternatives and similar repositories for defcon-vm
Users that are interested in defcon-vm are comparing it to the libraries listed below
Sorting:
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆92Jul 2, 2017Updated 8 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- ☆280May 21, 2020Updated 5 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Deprecated Binary Ninja prototype written in Python☆524Oct 1, 2020Updated 5 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- High-throughput fuzzer and emulator of DECREE binaries☆241Sep 4, 2019Updated 6 years ago
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- Tools, documentation and test inputs for fuzzing opensource projects with AddressSanitizer and friends.☆29Sep 24, 2015Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- DefCon24☆122Sep 2, 2016Updated 9 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 8 years ago
- The Internetwache CTF 2016 repository☆74Mar 28, 2021Updated 4 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap☆167May 10, 2018Updated 7 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆400Aug 2, 2022Updated 3 years ago
- Linux bind shell with anti-reverse engineering techniques☆291Feb 9, 2017Updated 9 years ago