gynvael / stream
Gynvael's Livestream code
☆135Updated last year
Alternatives and similar repositories for stream:
Users that are interested in stream are comparing it to the libraries listed below
- Rozwiązania ćwiczeń z książki "Zrozumieć Programowanie"☆27Updated last year
- Sourcecode created during my Livestream (English)☆111Updated 4 years ago
- Rather bad Windows/Linux RPC interface specialized for a Windows-host/Linux-guest configuration.☆54Updated 6 years ago
- 2016 DEF CON Qualifier Challenges☆180Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆26Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- ☆77Updated 9 years ago
- Some kernel exploits☆144Updated 7 years ago
- Yet another dumb IRC bot☆9Updated last year
- Exercises for learning Reverse Engineering and Exploitation.☆385Updated 5 years ago
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆155Updated 6 years ago
- 34C3 Junior CTF pwnables☆116Updated 6 years ago
- ☆137Updated 3 years ago
- ☆89Updated 5 months ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago
- Tutorial for writing kernel exploits☆251Updated 7 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 7 years ago
- CTF writeups☆111Updated 7 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆124Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆179Updated 10 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆162Updated 8 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- Just another ray tracer☆17Updated 7 years ago
- A repository of challenges from various CTF competitions.☆154Updated 10 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- Setup for a pwning VM☆60Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆147Updated 6 years ago