luker983 / google-ctf-2020Links
My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!
☆21Updated 5 years ago
Alternatives and similar repositories for google-ctf-2020
Users that are interested in google-ctf-2020 are comparing it to the libraries listed below
Sorting:
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆52Updated 7 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- ☆31Updated last month
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆87Updated 3 years ago
- ☆20Updated 3 years ago
- Breaking secure checksums in the scudo heap allocator☆14Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆32Updated last year
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Some presentations I did in the past☆65Updated 2 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 6 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- HN Security's advisories.☆22Updated 3 weeks ago
- Cisco RV110w UPnP stack overflow☆28Updated 4 years ago
- r2con 2020 CTF kernel challenge☆12Updated 5 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆79Updated last year
- A library for patching ELFs☆57Updated 4 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 7 months ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- #INFILTRATE20 raptor's party pack.☆29Updated last year
- Android privilege escalation via an use-after-free in binder.c☆39Updated 5 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago