integeruser / on-pwning
My solutions to some CTF challenges and a list of interesting resources about pwning stuff
☆111Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for on-pwning
- Exploitation and Mitigation Slides☆127Updated 5 months ago
- A collection of curated resources and CVEs I use for research.☆102Updated 3 years ago
- Useful tips by OTA CTF members☆135Updated 5 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- a repo of links to useful writeups of pwn challenges☆25Updated 6 years ago
- Collection of scripts and writeups☆320Updated 2 years ago
- ☆107Updated 4 years ago
- ☆151Updated 2 years ago
- ☆85Updated 2 years ago
- A tool for finding the one gadget RCE in libc☆74Updated 4 years ago
- notes and code on past CTFs☆100Updated 3 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆109Updated 7 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆86Updated 5 years ago
- ☆53Updated 2 years ago
- Some CTF write up☆240Updated 2 years ago
- A happy heap editor to support your exploitation process☆195Updated 3 years ago
- Basic pwntools for Windows☆256Updated last year
- A DOM fuzzer☆143Updated 2 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆130Updated 5 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆188Updated 2 years ago
- A collection of browser exploitation codes from Singular Security Lab.☆181Updated last year
- 🔍Heap analysis tool for CTF pwn.☆221Updated 3 years ago
- An interactive memory info for pwning / exploiting☆100Updated last year
- An example on how to do performant in-memory fuzzing with AFL++ and Frida☆136Updated 4 years ago
- ☆24Updated 3 years ago
- Wiki-like CTF write-ups repository by ByteBandits☆101Updated last year
- Writeups for some CTF challenges. I keep the copy of task files in case you would like to try them yourself.☆9Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆181Updated 7 months ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆66Updated 7 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆211Updated last year