made-in-mim / writeupsLinks
☆15Updated 2 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆49Updated 6 years ago
- Official training ground for the OTA CTF team☆39Updated 2 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Guide to buffer overflows☆59Updated 4 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- ☆20Updated 3 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 7 months ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Setup for a pwning VM☆62Updated 6 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆70Updated 8 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- Leak other players' temporary workspaces for ctf and wargames.☆86Updated 2 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆34Updated 4 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Challenges for INShAck 2018☆25Updated 6 years ago
- CLI tool to get the links of original writeups from ctftime.org☆32Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- All challenges I created for CTF☆12Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- ☆36Updated 4 years ago
- Firmware analysis website + API☆43Updated 4 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Updated 6 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 8 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago