writeups for CTFs and other stuff
☆24Dec 29, 2020Updated 5 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Jun 14, 2021Updated 4 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- ☆14Jan 11, 2026Updated 2 months ago
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21May 20, 2020Updated 5 years ago
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- ☆29May 9, 2022Updated 3 years ago
- RootedCON Malaga 2021 Talk materials (Slides, Tools, Code, Samples,...)☆14Jan 5, 2022Updated 4 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 6 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- ☆21May 31, 2024Updated last year
- ☆25Dec 8, 2020Updated 5 years ago
- XML representation of the x86 instruction set☆29Feb 15, 2026Updated last month
- Precompiled LLVM packages ready for (de)obfuscation related development.☆22Dec 1, 2025Updated 3 months ago
- A live preview for TikZ drawings☆24Mar 26, 2023Updated 2 years ago
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- python program to detect Portable_Executable files as either malicious or legitimate by trying out 5 different classification algorithms …☆11Feb 15, 2017Updated 9 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- Proof-of-concept implementation for the paper "Hammulator: Simulate Now - Exploit Later" (DRAMSec 2023)☆17Sep 15, 2025Updated 6 months ago
- Services, Checkers and Exploits from saarCTF 2022. https://ctf.saarland☆14May 24, 2022Updated 3 years ago
- Blog posts☆29Aug 7, 2020Updated 5 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Aug 17, 2021Updated 4 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- Medusa Repository: Transynther tool and Medusa Attack☆24Jul 17, 2020Updated 5 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Jul 22, 2019Updated 6 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆30Jul 12, 2021Updated 4 years ago
- Yet another windows internals repo☆220Aug 29, 2021Updated 4 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Non-linear Mixed Boolean-Arithmetic Expressions☆73Apr 18, 2024Updated last year
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- Repository of the paper "Reproducing Spectre Attack with gem5, How To Do It Right?"☆18Jul 27, 2023Updated 2 years ago