guyinatuxedo / real_hacker_hoursLinks
☆20Updated 3 years ago
Alternatives and similar repositories for real_hacker_hours
Users that are interested in real_hacker_hours are comparing it to the libraries listed below
Sorting:
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆63Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- The Dumb Network Fuzzer☆20Updated last year
- SSD Challenges☆47Updated 2 years ago
- ☆20Updated 5 years ago
- ☆13Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- ☆26Updated 3 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- ☆18Updated 5 years ago
- ☆182Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Scripts I used during CTP☆67Updated 5 years ago
- tools for shellcoding☆56Updated last year
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- ☆13Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 11 months ago