lkmidas / Short-CTF-WriteupsLinks
Short writeups/solvers for interesting CTF challenges.
☆16Updated 3 years ago
Alternatives and similar repositories for Short-CTF-Writeups
Users that are interested in Short-CTF-Writeups are comparing it to the libraries listed below
Sorting:
- Binary exploitation exercises and scripts☆12Updated 3 years ago
- CTF writeups☆18Updated 3 weeks ago
- My CTF writeups☆27Updated 4 years ago
- A collection of my CTF writeups☆21Updated last month
- CTF writeups☆18Updated 2 years ago
- tools for shellcoding☆58Updated 2 years ago
- A tool to inject C code into ELF64 binaries☆30Updated 4 years ago
- My Personal Reading lists for CVE Writeups☆38Updated 3 years ago
- Automatic ROPChain Generation☆294Updated 5 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated 2 years ago
- Set of pre-generated pwn.college challenges☆68Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 months ago
- ☆18Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆53Updated 3 years ago
- ☆38Updated last year
- Writeups for CTFs☆78Updated 5 months ago
- A collection of curated resources and CVEs I use for research.☆107Updated 4 years ago
- Code snippets for Reverse engineering training for xtraining platform☆34Updated 3 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- ☆38Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆29Updated 4 years ago
- ☆45Updated 4 months ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- House of Gods Heap Exploitation Technique☆19Updated 3 years ago
- ☆80Updated 11 months ago
- reverse engninering & pwn writeup☆26Updated 5 years ago