guyinatuxedo / real_hacker_hoursLinks
☆20Updated 3 years ago
Alternatives and similar repositories for real_hacker_hours
Users that are interested in real_hacker_hours are comparing it to the libraries listed below
Sorting:
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆63Updated 2 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- The Dumb Network Fuzzer☆20Updated last year
- ☆20Updated 5 years ago
- Dockerized setup for quick pwning☆23Updated 4 years ago
- SSD Challenges☆47Updated 2 years ago
- ☆13Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 3 months ago
- ☆49Updated 4 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- ☆19Updated 11 years ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Updated 2 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆52Updated last year
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- ☆18Updated 5 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 3 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆36Updated 6 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago