guyinatuxedo / new_nightmareLinks
☆22Updated 2 years ago
Alternatives and similar repositories for new_nightmare
Users that are interested in new_nightmare are comparing it to the libraries listed below
Sorting:
- All Files, Scripts, and exploits can be found here☆66Updated 4 years ago
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Udemy – Linux Heap Exploitation☆45Updated 4 years ago
- 'Ike: A binary exploitation and reversing handbook.☆82Updated 6 months ago
- CTF Writeups☆27Updated 11 months ago
- Source code and solution of CTF challenges that I created.☆46Updated last month
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆22Updated 6 months ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- ☆165Updated 3 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆75Updated 2 weeks ago
- Simple scraper for automating challenges gathering from a CTFd platform☆46Updated 5 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆32Updated 5 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆27Updated 3 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆56Updated last year
- SEETF 2022 Public Challenge Files, Sources, and Solutions☆28Updated 3 years ago
- ☆9Updated last year
- reverse engninering & pwn writeup☆24Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- ☆84Updated 7 years ago
- My write-ups from various CTFs☆118Updated last year
- A full English version of the popular ctf-wiki☆99Updated last year
- Gonna share my writeups and resources here☆67Updated 6 months ago
- ☆51Updated 6 years ago
- esoteric☆55Updated 4 years ago
- ☆45Updated 2 years ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated 2 years ago
- All challenges from DiceCTF 2023☆72Updated 2 years ago