Belluminar 2016 Beijing stuff
☆26Jun 3, 2016Updated 9 years ago
Alternatives and similar repositories for belluminar
Users that are interested in belluminar are comparing it to the libraries listed below
Sorting:
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- jeap, exploit 10 in 0ctf 2016 quals☆15Mar 14, 2016Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆123Sep 1, 2022Updated 3 years ago
- Unofficial American Fuzzy Lop repo☆25Aug 5, 2016Updated 9 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Aug 7, 2016Updated 9 years ago
- ☆17May 13, 2019Updated 6 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- IDA Pro plugin to view Exports☆17Sep 21, 2018Updated 7 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- various CTF writeups☆61Jun 28, 2018Updated 7 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- Fork/mirror of Darcs repo for PyFlag (Forensic and Log Analysis GUI)☆36Oct 16, 2010Updated 15 years ago
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆36Jun 24, 2015Updated 10 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- A crappy tool used in our private PS4 jailbreak☆99Oct 27, 2016Updated 9 years ago
- Collection of software bugs found by SkyLined☆68Nov 10, 2016Updated 9 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- ☆34Aug 9, 2022Updated 3 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Protobuf metadata extraction tool☆131Aug 6, 2012Updated 13 years ago
- Proof-of-Concept exploit for jscript9 bug (MS16-063) with CFG Bypass☆40Dec 28, 2016Updated 9 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- Convert shared libraries into relocatable objects☆10Dec 23, 2023Updated 2 years ago
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- scoreserver web application for CTF(Capture The Flag)☆24Aug 3, 2022Updated 3 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago