lephuduc / Reversing.krLinks
Write-ups cho một số bài trên Reversing.kr
☆12Updated 2 years ago
Alternatives and similar repositories for Reversing.kr
Users that are interested in Reversing.kr are comparing it to the libraries listed below
Sorting:
- ☆264Updated 2 years ago
- Codebase for challenges in VHC_CTF_2023☆18Updated 2 years ago
- A powerful and flexible Python-based network scanning framework. Inspired by Nmap, designed to combine simplicity and effectiveness for b…☆32Updated 2 months ago
- A Python-based tool for analyzing IoT firmware, supporting both filesystem-based and RTOS-based (e.g. FreeRTOS, Zephyr) images. Features …☆19Updated 9 months ago
- This project detects malicious or abnormal traffic in industrial control networks, visualizes network topology, and identifies compromise…☆14Updated 10 months ago
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆217Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆373Updated 10 months ago
- knowledge is power☆230Updated last month
- CTF Scoreboard Archive is a web app for storing and displaying CTF scoreboards, supporting links (CTFd, rCTF), MHTML uploads, and GIF gen…☆12Updated last year
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆474Updated 2 years ago
- My notes on pwn☆293Updated 3 weeks ago
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆22Updated 3 years ago
- Challenge handouts, source code, and solutions for UofTCTF 2025☆39Updated last year
- Official writeups for Cyber Apocalypse CTF 2025: Tales from Eldoria☆192Updated 10 months ago
- This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigati…☆22Updated 2 years ago
- a repository for CTF write-ups☆17Updated last year
- Distributed Computing Interaction Framework: Optimizing the algorithm with the Server-Worker model☆18Updated last year
- Course materials for teaching cybersecurity in a Capture the Flag environment☆180Updated 4 years ago
- A simple binary vulnerability scanner module for Linux that statically analyzes ELF binary files to identify potential vulnerabilities.☆18Updated 7 months ago
- Files + Solutions for DownUnderCTF 2025 Challenges☆107Updated 6 months ago
- pwninit - automate starting binary exploit challenges☆1,062Updated 2 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆88Updated 2 months ago
- Writeups for CTF challenges☆21Updated 2 years ago
- Bounty Boys: OWASP Top 10 Series☆29Updated last year
- CTF Archives: Collection of CTF Challenges.☆1,355Updated this week
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆141Updated 11 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆59Updated 2 years ago
- Network analysis tool for Attack Defence CTF☆421Updated 4 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆105Updated last year
- TCP1P CTF 2024 Challenges Repo☆27Updated last year