☆18Jun 2, 2021Updated 4 years ago
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- ☆55Apr 28, 2022Updated 3 years ago
- records of my daily sec learning☆13Mar 20, 2020Updated 5 years ago
- iot安全题目学习记录☆16Dec 13, 2021Updated 4 years ago
- ☆25Mar 26, 2025Updated 11 months ago
- ☆32Apr 28, 2022Updated 3 years ago
- ☆17Dec 30, 2020Updated 5 years ago
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- Optimizing Directed Fuzzing via Target-tailored Program State Restriction☆31May 16, 2023Updated 2 years ago
- ☆25Nov 8, 2023Updated 2 years ago
- ☆26Aug 28, 2024Updated last year
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- Tool to trace ARM Cortex-M assembly instructions and extract arguments to configuration APIs (supervisor calls or function calls).☆31Jan 17, 2022Updated 4 years ago
- 2020西湖论剑IOT闯关赛赛后开放资源☆57Nov 25, 2020Updated 5 years ago
- All architecture and all version of gdbserver.☆31Sep 23, 2022Updated 3 years ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆85Jan 20, 2025Updated last year
- Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing☆33Mar 25, 2021Updated 4 years ago
- Collection of slides☆33Aug 20, 2025Updated 6 months ago
- ☆37May 11, 2022Updated 3 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- On-device Machine Learning model analyzer and extractor for Android Apps, check out our USENIX Security'21 paper "Mind Your Weight(s): A …☆34Feb 8, 2022Updated 4 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- PDU encode/decode☆14May 12, 2010Updated 15 years ago
- A few commands to get and display information about episodes of The PowerShell Podcast. This module is not officially affiliated with the…☆13Sep 2, 2025Updated 5 months ago
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- ☆10Jun 5, 2023Updated 2 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- Python implementation of various (graph) algorithms☆11Nov 22, 2013Updated 12 years ago
- A Benchmark for Evaluating Safety and Trustworthiness in Web Agents for Enterprise Scenarios☆19Updated this week
- Japanese Kana Loop Exercise - 五十音魔鬼训练~☆12Aug 16, 2025Updated 6 months ago
- d3-hierarchy 中文☆10Jul 22, 2019Updated 6 years ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- A KV storage engine based on LSM Tree, supporting Redis RESP☆25Sep 14, 2025Updated 5 months ago
- ☆36Jun 14, 2021Updated 4 years ago
- Code and artifacts related to the Asia CCS 2022 paper☆38Nov 8, 2021Updated 4 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- Fuzzing Secure Monitor Implementations☆19Aug 3, 2024Updated last year
- Multi-threading brainfuck compiler☆11Dec 10, 2017Updated 8 years ago
- 机器学习、大数据等笔记分析和代码整理,知乎专栏和博客等,github作为备份和同步管理☆10Jan 11, 2019Updated 7 years ago
- ☆12Jan 28, 2023Updated 3 years ago