legitbs / quals-2016
2016 DEF CON Qualifier Challenges
☆180Updated 8 years ago
Alternatives and similar repositories for quals-2016:
Users that are interested in quals-2016 are comparing it to the libraries listed below
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆286Updated 8 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Updated 8 years ago
- CTF writeups☆112Updated 7 years ago
- Repository to train/learn memory corruption on the ARM platform.☆353Updated 8 years ago
- The first open source vulnerability scanner for firmwares☆195Updated 8 years ago
- Hodor! Fuzzer..☆129Updated 8 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆162Updated last week
- CTF Writeups☆186Updated 7 years ago
- ☆138Updated 3 years ago
- capstone based disassembler for extracting to binnavi☆228Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 9 years ago
- Radare Congress Stuff☆207Updated 5 months ago
- afl-fuzz for javascript☆204Updated 8 years ago
- Wadi Fuzzing Harness☆127Updated 8 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆133Updated 9 years ago
- A distributed fuzzing testing suite with web administration☆374Updated 6 years ago
- PEDA - Python Exploit Development Assistance for GDB☆97Updated 8 years ago
- The Internetwache CTF 2016 repository☆73Updated 4 years ago
- Scripts for Binary Ninja☆254Updated 2 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆141Updated 6 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 6 years ago
- PyAna - Analyzing the Windows shellcode☆247Updated 9 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Updated 9 years ago
- ☆72Updated 6 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 9 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆90Updated 9 years ago