mitre-cyber-academy / 2024-ectf-insecure-exampleLinks
Insecure reference example for the 2024 Collegiate eCTF
☆30Updated last year
Alternatives and similar repositories for 2024-ectf-insecure-example
Users that are interested in 2024-ectf-insecure-example are comparing it to the libraries listed below
Sorting:
- 'Ike: A binary exploitation and reversing handbook.☆81Updated 5 months ago
- Challenges and writeups for the US Cyber Open for 2024☆19Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆124Updated 2 years ago
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- Binary Golf Grand Prix☆60Updated 3 months ago
- Source for BuckeyeCTF 2022 challenges☆28Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- General purpose attack-defense range for zero-config deployment☆27Updated 4 months ago
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 4 years ago
- esoteric☆54Updated 4 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆42Updated last year
- UFSIT scripts and tools for hardening and auditing☆14Updated last month
- ☆50Updated last year
- A script to download all the challenges and files from the CTFd instance.☆56Updated last week
- Web Exploitation Workflow for CTF Challenges☆49Updated 8 years ago
- Toolkit for creating cryptographic figures and videos.☆33Updated last year
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Runs exploits, fast.☆84Updated 11 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆54Updated last year
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆158Updated 7 months ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- A simple playground for Android CTF challenges.☆69Updated last week
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆31Updated 2 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- Challenges created for the US Cyber Open 2023 (Season 3)☆13Updated 2 years ago
- Run the Medusa Android framework inside a docker container on x86 or ARM☆38Updated 2 years ago