made-in-mim / writeupsLinks
☆15Updated 2 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- Guide to buffer overflows☆59Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- Official training ground for the OTA CTF team☆39Updated 3 years ago
- Slack bot for challenge management in large teams☆60Updated 3 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 9 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Setup for a pwning VM☆62Updated 7 years ago
- ☆21Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆35Updated 4 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆54Updated 9 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Format string exploitation helper☆46Updated 10 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated 3 months ago
- All challenges I created for CTF☆12Updated 4 years ago
- various CTF writeups☆61Updated 7 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆107Updated last year
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 11 months ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Updated 8 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- Slides and stuffs of the meetings during the 2019☆33Updated 4 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago