kernelpoppers / ctf_writeups
CTF challenge writeups
☆13Updated 3 years ago
Related projects: ⓘ
- esoteric☆50Updated 4 years ago
- Binary Golf Library☆62Updated 3 years ago
- Cheat sheet of binary protections flags☆22Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆42Updated 2 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 2 years ago
- Very simple script(s) to hasten binary exploit creation☆89Updated 3 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 2 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆96Updated 3 years ago
- ☆45Updated last year
- Code snippets for bare-metal malware development☆94Updated 2 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆58Updated 5 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆76Updated 8 months ago
- ☆80Updated 6 years ago
- ☆129Updated 3 years ago
- Exploitation and Mitigation Slides☆127Updated 3 months ago
- ☆152Updated 2 years ago
- 'Ike: A binary exploitation and reversing handbook.☆66Updated last year
- Set of pre-generated pwn.college challenges☆58Updated last year
- Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64☆39Updated 4 years ago
- Plugin to embed Ghidra Decompiler into Binary Ninja☆97Updated 2 years ago
- Make your Ghidra Lazy!☆130Updated 4 years ago
- I will upload challenges I create for various ctf's or educational purposes here.☆22Updated 2 years ago
- Binary Golf Examples and Resources☆247Updated 2 months ago
- Notes on using the Python bindings for the Unicorn Engine☆66Updated 4 years ago
- Challenges used in CUCTF 2019☆24Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆213Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆314Updated last year
- ☆173Updated 6 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated last year