lkmidas / Short-CTF-WriteupsLinks
Short writeups/solvers for interesting CTF challenges.
☆16Updated 3 years ago
Alternatives and similar repositories for Short-CTF-Writeups
Users that are interested in Short-CTF-Writeups are comparing it to the libraries listed below
Sorting:
- Binary exploitation exercises and scripts☆12Updated 3 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 months ago
- My Personal Reading lists for CVE Writeups☆38Updated 4 years ago
- My CTF writeups☆27Updated 4 years ago
- CTF writeups☆18Updated 2 years ago
- ☆38Updated last year
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year
- Slides & Hands-on for the reverse engineering workshop☆184Updated 3 years ago
- A tool to inject C code into ELF64 binaries☆30Updated 4 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆96Updated 2 years ago
- CTF writeups☆18Updated 2 weeks ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated 2 months ago
- Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64☆42Updated 5 years ago
- ☆22Updated last year
- Set of pre-generated pwn.college challenges☆68Updated 3 years ago
- A collection of my CTF writeups☆23Updated last week
- Write-ups for crackmes and CTF challenges☆53Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 11 months ago
- Writeups for CTFs☆78Updated 5 months ago
- ☆80Updated 11 months ago
- tools for shellcoding☆59Updated 2 years ago
- ☆28Updated 4 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Updated 3 years ago
- SSD Challenges☆48Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- ☆26Updated 3 years ago