legitbs / quals-2013
Source for many challenges from DEF CON 21 CTF Qualifier
☆40Updated 11 years ago
Alternatives and similar repositories for quals-2013:
Users that are interested in quals-2013 are comparing it to the libraries listed below
- ☆26Updated 8 years ago
- ☆21Updated 6 years ago
- ☆22Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- quals-2014☆22Updated 10 years ago
- ☆34Updated 9 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- ☆39Updated 4 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆34Updated 11 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 10 years ago
- AxMan ActiveX Fuzzer: This is ancient, please don't use it =D☆28Updated 4 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆26Updated 13 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆93Updated 3 years ago
- A collection of useful radare2 scripts!☆30Updated 7 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- ☆44Updated 6 years ago
- black hat Asia 2017 Slides☆22Updated 8 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago