ltzehan / monkeLinks
Reject membrane, embrace monke
☆10Updated 3 years ago
Alternatives and similar repositories for monke
Users that are interested in monke are comparing it to the libraries listed below
Sorting:
- Best CTF in August 2021!☆18Updated 4 years ago
- ☆10Updated 5 years ago
- NUS Modules' Summary & Cheatsheets made using LaTeX☆31Updated 6 months ago
- Many-Time Pad Interactive☆177Updated last year
- VirtuAlization GDb integrations in pwntools☆36Updated last month
- A Python library to debug binary executables, your own way.☆281Updated last week
- GreyCTF 2022 challenge source and solution☆17Updated 3 years ago
- A full English version of the popular ctf-wiki☆103Updated last year
- Website for the CS1010☆34Updated 5 years ago
- SMT based attacks on non cryptographic PRNGs☆87Updated 2 years ago
- EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware☆13Updated 2 years ago
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆42Updated 2 years ago
- ☆12Updated 2 years ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆563Updated this week
- My write-ups from various CTFs☆117Updated last year
- Automatic tool to quickly start a pwn CTF challenge☆45Updated 2 years ago
- CTF writeups from ironore15, KAIST GoN.☆15Updated 3 years ago
- knowledge is power☆229Updated 3 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- HITB SECCONF EDU CTF 2021. Developed with ❤️ by Hackerdom team and HITB.☆19Updated 4 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆192Updated 4 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆237Updated last year
- ☆16Updated 4 months ago
- My personnal repository☆10Updated 2 months ago
- Network analysis tool for Attack Defence CTF☆394Updated last month
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆95Updated 4 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,370Updated 9 months ago
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆139Updated 8 months ago
- HITB SECCONF CTF 2022. Developed with ❤️ by Hackerdom team and HITB.☆20Updated 3 years ago
- Infrastructure powering the pwn.college dojo☆402Updated this week