iamABH / awesome-hardware-ctf
A curated list of hardware-oriented CTF challenges.
☆27Updated 6 months ago
Alternatives and similar repositories for awesome-hardware-ctf:
Users that are interested in awesome-hardware-ctf are comparing it to the libraries listed below
- ☆44Updated 3 years ago
- ☆89Updated 11 months ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- Write ups for Ph0wn CTF☆41Updated 3 months ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆34Updated this week
- A script to download all the challenges and files from the CTFd instance.☆55Updated 8 months ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆34Updated 5 months ago
- ☆162Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆111Updated last year
- Write-ups for various CTF☆188Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- ☆51Updated 5 months ago
- A full English version of the popular ctf-wiki☆90Updated 9 months ago
- All Files, Scripts, and exploits can be found here☆63Updated 3 years ago
- Files + Writeups for DownUnderCTF 2023 Challenges☆170Updated last year
- ASLR bypass without infoleak☆160Updated 3 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆81Updated last year
- ☆16Updated 10 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆151Updated 4 months ago
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 4 months ago
- ☆50Updated this week
- Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Cover a wid…☆102Updated this week
- Resources to getting started vulnerability research on IoT/embedded devices.☆47Updated this week
- Runs exploits, fast.☆82Updated 8 months ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆9Updated 10 months ago
- 🐍 Solving CTF challenges using Z3 and Python☆57Updated last year
- ☆88Updated 3 months ago
- Python library for CTFer☆135Updated this week
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago