lkmidas / Short-CTF-WriteupsLinks
Short writeups/solvers for interesting CTF challenges.
☆17Updated 2 years ago
Alternatives and similar repositories for Short-CTF-Writeups
Users that are interested in Short-CTF-Writeups are comparing it to the libraries listed below
Sorting:
- My CTF writeups☆27Updated 4 years ago
- Binary exploitation exercises and scripts☆10Updated 3 years ago
- CTF writeups☆18Updated last year
- Writeups for CTFs☆72Updated last month
- CTF writeups☆17Updated 2 months ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 2 months ago
- tools for shellcoding☆56Updated last year
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- A collection of my CTF writeups☆19Updated 7 months ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 5 months ago
- ☆78Updated 5 months ago
- A collection of curated resources and CVEs I use for research.☆107Updated 4 years ago
- My Personal Reading lists for CVE Writeups☆36Updated 3 years ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- ☆84Updated 7 years ago
- All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs☆9Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- A tool to inject C code into ELF64 binaries☆30Updated 4 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- ☆26Updated 3 years ago
- ☆33Updated 7 months ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64☆42Updated 5 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- CTFs and solutions for Linux binary exploitation.☆110Updated last year
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago