lkmidas / Short-CTF-WriteupsLinks
Short writeups/solvers for interesting CTF challenges.
☆17Updated 2 years ago
Alternatives and similar repositories for Short-CTF-Writeups
Users that are interested in Short-CTF-Writeups are comparing it to the libraries listed below
Sorting:
- ☆32Updated 6 months ago
- A tool to inject C code into ELF64 binaries☆30Updated 4 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated last month
- Linux Kernel N-day Exploit/Analysis.☆65Updated 8 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- reverse engninering & pwn writeup☆24Updated 4 years ago
- Writeups for CTFs☆73Updated 3 weeks ago
- My CTF writeups☆27Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- A collection of my CTF writeups☆18Updated 6 months ago
- ☆18Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- tools for shellcoding☆56Updated last year
- Binary exploitation exercises and scripts☆10Updated 3 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆32Updated 4 years ago
- A collection of curated resources and CVEs I use for research.☆107Updated 3 years ago
- CTF writeups☆17Updated last month
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- ☆78Updated 4 months ago
- My Personal Reading lists for CVE Writeups☆36Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆63Updated 2 years ago
- REVerse ENGineering Environment☆62Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- ☆26Updated 3 years ago
- Automatic ROPChain Generation☆288Updated 5 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- ☆71Updated 2 years ago