jailctf / how2pythonLinks
Repository to keep track of python memory corruption bugs that can be used to potentially bypass audit hooks
☆64Updated last month
Alternatives and similar repositories for how2python
Users that are interested in how2python are comparing it to the libraries listed below
Sorting:
- Source code for the DEF CON 33 CTF Qualifiers.☆57Updated 5 months ago
- A GDB+GEF-style debugger for unloading Python pickles☆70Updated 7 months ago
- Python sandbox escape wiki + payload generator☆139Updated last year
- Challenge source code and author write-ups for KalmarCTF☆69Updated 3 weeks ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆241Updated last year
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Updated 5 months ago
- Source code for the DEF CON 32 CTF Qualifiers.☆76Updated last year
- A bunch of v8 resources (with a security focus)☆93Updated 3 weeks ago
- ☆270Updated 6 months ago
- a new class of file structure attacks☆58Updated 3 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆134Updated 2 years ago
- ☆36Updated last year
- in preparation for the pyjail club☆62Updated last month
- ☆27Updated last year
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆175Updated last year
- CTF write-ups by Maple Mallard Magistrates☆45Updated last year
- MCP for Pwn☆202Updated last month
- A tool for automating setup of kernel pwn challenges☆61Updated 3 months ago
- Source code for the DEF CON 31 CTF Qualifiers.☆127Updated 2 years ago
- ☆17Updated 3 years ago
- Challenges and write-ups for GCC-CTF 2024☆18Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆101Updated 3 weeks ago
- 🎵 Official source code and writeups for SekaiCTF 2024!☆84Updated 5 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Updated 6 months ago
- Docker container with all required CTF tools.☆60Updated last year
- Infrastructure for the Potluck CTF☆25Updated last year
- Easily debug processes running in docker containers☆29Updated last year
- A Linux Kernel Exploitation C Library☆19Updated 3 months ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Updated last year
- visualizing CTF clusters (teams playing together at DEFCON)☆28Updated 2 years ago