CTF write-ups / solution scripts
☆23Nov 4, 2018Updated 7 years ago
Alternatives and similar repositories for CTF-WriteUps
Users that are interested in CTF-WriteUps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 25, 2019Updated 6 years ago
- CTF Writeups☆23May 9, 2018Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- memcached protocol for server implementation☆15Jan 4, 2022Updated 4 years ago
- a modular malware framework written in golang☆11May 6, 2019Updated 6 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- Clipsal C-Bus Wiser plugin for home bridge☆11Apr 11, 2023Updated 2 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆49Feb 16, 2018Updated 8 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Jan 27, 2021Updated 5 years ago
- An x86_64 Linux decompiler written in Python!☆14Jan 16, 2019Updated 7 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- ☆12Apr 29, 2019Updated 6 years ago
- posting example☆15May 11, 2020Updated 5 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- A simple kernel written in Rust for studying purposes.☆52May 6, 2018Updated 7 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- A plugin for Binary Ninja containing tools for iOS reversing☆30Aug 3, 2017Updated 8 years ago
- Harness for fuzzing GoldSrc file formats with WinAFL☆20Apr 26, 2020Updated 5 years ago
- ☆26Feb 16, 2021Updated 5 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- INTEL PIN dbi based process tracer☆19Jun 25, 2020Updated 5 years ago
- ☆14Feb 15, 2019Updated 7 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆227Jul 2, 2025Updated 8 months ago