mahaloz / ikeLinks
'Ike: A binary exploitation and reversing handbook.
☆83Updated last week
Alternatives and similar repositories for ike
Users that are interested in ike are comparing it to the libraries listed below
Sorting:
- ☆103Updated last year
- ☆169Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆66Updated 4 years ago
- A full English version of the popular ctf-wiki☆99Updated last year
- knowledge is power☆225Updated 3 weeks ago
- My write-ups from various CTFs☆118Updated last year
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆225Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆163Updated 9 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆120Updated last year
- My notes on pwn☆289Updated 2 weeks ago
- Files + Writeups for DownUnderCTF 2023 Challenges☆171Updated last year
- Runs exploits, fast.☆88Updated last year
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆27Updated 3 years ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆50Updated this week
- Udemy – Linux Heap Exploitation☆45Updated 4 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated 2 years ago
- 🐍 Solving CTF challenges using Z3 and Python☆61Updated 2 years ago
- CTF writeups from The Flat Network Society☆143Updated last month
- ☆45Updated 2 years ago
- Slides from our technical talks☆29Updated 10 months ago
- CTF write-ups☆97Updated 9 months ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆221Updated last year
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- esoteric☆55Updated 4 years ago
- Resources to getting started vulnerability research on IoT/embedded devices.☆77Updated 2 weeks ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆262Updated 9 months ago
- Write-ups for various CTF☆193Updated last year
- CTFs and solutions for Linux binary exploitation.☆111Updated last year