luker983 / google-ctf-2020
My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!
☆19Updated 4 years ago
Related projects: ⓘ
- ☆26Updated 3 years ago
- The Dumb Network Fuzzer☆20Updated last year
- ☆29Updated 8 months ago
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆35Updated 4 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated 8 months ago
- ☆20Updated this week
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆29Updated 4 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- Cisco RV110w UPnP stack overflow☆25Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆26Updated 2 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 5 years ago
- A demo app vulnerable to directory traversal☆15Updated 4 years ago
- Dockerized setup for quick pwning☆23Updated 3 years ago
- Modern Binary Exploitation write-ups.☆4Updated 4 years ago
- A repository for my conference presentations☆35Updated 4 years ago
- A Python IDA Plugin that finds a route from one function to another.☆12Updated 5 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆48Updated 6 years ago
- Dockerfiles for (un)popular fuzzers!☆28Updated 4 years ago
- ☆13Updated 4 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆38Updated 3 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆55Updated last year
- #INFILTRATE20 raptor's party pack.☆28Updated 8 months ago
- ☆20Updated 5 years ago
- ☆17Updated this week
- Simple WebSocket fuzzer☆32Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 3 years ago
- ☆20Updated 2 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 3 years ago