☆111Dec 30, 2019Updated 6 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- QEMU enhanced with OS handlers, external plugins, and rapid analysis execution engine.☆41Jun 19, 2020Updated 5 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Useful tips by OTA CTF members☆152Oct 5, 2019Updated 6 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- EmpireCTF – write-ups, capture the flag, cybersecurity☆135Jun 29, 2025Updated 8 months ago
- pwninit - automate starting binary exploit challenges☆1,072Dec 7, 2025Updated 2 months ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- Solutions for ROP Emporium challenges (https://ropemporium.com/) in python.☆37Oct 25, 2017Updated 8 years ago
- ☆2,925Feb 8, 2026Updated 3 weeks ago
- Some pwn challenges selected for training and education.☆388Jun 26, 2023Updated 2 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆224May 6, 2023Updated 2 years ago
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆14Dec 27, 2019Updated 6 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Jul 25, 2019Updated 6 years ago
- CTF Tools☆12Nov 10, 2019Updated 6 years ago
- auto-ropper☆17Jul 7, 2022Updated 3 years ago
- Some CTF write up☆255Aug 29, 2025Updated 6 months ago
- 之Crypto☆43Jan 6, 2017Updated 9 years ago
- CTF Reversing Challenges List☆289Jul 3, 2019Updated 6 years ago
- ☆81Oct 15, 2017Updated 8 years ago
- Using Intel's PIN tool to solve CTF problems☆507Apr 12, 2020Updated 5 years ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- 💖CTF pwn framework.☆341May 3, 2022Updated 3 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆50Dec 31, 2023Updated 2 years ago
- Perfect Blue's CTF Writeups☆694Jun 24, 2024Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆702Sep 10, 2024Updated last year
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,820Jun 8, 2019Updated 6 years ago
- Modification of LTE Firmwares on smartphones☆19Dec 31, 2020Updated 5 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆211Jan 26, 2022Updated 4 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- ☆18Apr 20, 2021Updated 4 years ago
- CTF writeups☆18Oct 19, 2023Updated 2 years ago
- For Linux binary Exploitation☆844Mar 26, 2018Updated 7 years ago
- I will provide details and pocs for some bugs I found.☆41Apr 15, 2024Updated last year
- 🔍Heap analysis tool for CTF pwn.☆223May 4, 2021Updated 4 years ago