luker983 / google-ctf-2020
My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!
☆19Updated 4 years ago
Alternatives and similar repositories for google-ctf-2020:
Users that are interested in google-ctf-2020 are comparing it to the libraries listed below
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆17Updated 3 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆26Updated 2 years ago
- frida snippet generator firefox extension for developer.android.com☆23Updated 2 years ago
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆35Updated 4 years ago
- A demo app vulnerable to directory traversal☆15Updated 4 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 5 years ago
- Modern Binary Exploitation write-ups.☆4Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆58Updated last year
- Not necessarily related to software bugs and exploits; this repo contains snippets of code that demonstrate some interesting functionalit…☆34Updated 3 years ago
- HN Security's advisories.☆21Updated 2 months ago
- ☆18Updated 5 years ago
- Repo with content from the sessions streamed on https://www.twitch.tv/viernesdecrypto☆16Updated 2 years ago
- qiling framework examples☆15Updated 3 years ago
- ☆16Updated 7 months ago
- ☆30Updated 2 months ago
- Dockerized setup for quick pwning☆23Updated 3 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- The Dumb Network Fuzzer☆19Updated last year
- Personal pwning toolset developed/used by myself. Use at your own risk.☆15Updated 2 years ago
- CTFs I've played so far☆17Updated last year
- My CTF writeups☆25Updated 3 years ago
- ☆11Updated 4 years ago
- This script tampers the apk to inject Facebook Stetho library to inspect app sandbox data on non-rooted device☆38Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- ☆26Updated 3 years ago
- ☆73Updated 2 years ago
- ☆13Updated 4 years ago
- Here be dragons. Or Slides. Or Papers. Or Nothing :)☆30Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year