CTF writeups
☆114Aug 26, 2017Updated 8 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- ☆92Aug 18, 2024Updated last year
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 8 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- CTF Writeups☆190Oct 8, 2017Updated 8 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- various CTF writeups☆61Jun 28, 2018Updated 7 years ago
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 6 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Mar 16, 2017Updated 8 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- A crappy tool used in our private PS4 jailbreak☆99Oct 27, 2016Updated 9 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 10 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- Files from my DEFCON CTF VM.☆273Sep 6, 2016Updated 9 years ago
- exploit dev. stuff☆20Aug 7, 2012Updated 13 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Writeups for CTF competitions.☆33May 24, 2016Updated 9 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- gdb plugin for android debugging☆103Jun 20, 2016Updated 9 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 4 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago