mahaloz / ike
'Ike: A binary exploitation and reversing handbook.
☆69Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ike
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- ☆67Updated 6 months ago
- Set of pre-generated pwn.college challenges☆60Updated last year
- ☆45Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆98Updated 10 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆60Updated 4 months ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆43Updated last year
- ☆157Updated 2 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆45Updated 5 months ago
- Slides from our technical talks☆25Updated 3 weeks ago
- A full English version of the popular ctf-wiki☆80Updated 4 months ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆49Updated this week
- FSOP Again☆19Updated 2 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆96Updated 2 months ago
- My write-ups from various CTFs☆114Updated 10 months ago
- ☆123Updated last year
- Challenge repository for the 2023 CSAW CTF Qualifiers☆29Updated last year
- I will upload challenges I create for various ctf's or educational purposes here.☆23Updated 2 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆60Updated last month
- ☆45Updated 5 years ago
- ASLR bypass without infoleak☆152Updated 3 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆36Updated last year
- ☆81Updated 7 years ago
- Udemy – Linux Heap Exploitation☆35Updated 3 years ago
- esoteric☆51Updated 4 years ago
- Cheat sheet of binary protections flags☆22Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆91Updated 3 years ago