mitre-cyber-academy / 2024-ectf-insecure-exampleLinks
Insecure reference example for the 2024 Collegiate eCTF
☆31Updated last year
Alternatives and similar repositories for 2024-ectf-insecure-example
Users that are interested in 2024-ectf-insecure-example are comparing it to the libraries listed below
Sorting:
- RE / Binary Exploitation Resources☆72Updated 7 years ago
- All Files, Scripts, and exploits can be found here☆69Updated 4 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Updated 2 years ago
- Write ups for Ph0wn CTF☆47Updated 3 months ago
- 'Ike: A binary exploitation and reversing handbook.☆87Updated 3 months ago
- Source for BuckeyeCTF 2022 challenges☆28Updated 3 years ago
- esoteric☆54Updated 5 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆56Updated 3 years ago
- Damn Vulnerable IoT Device☆213Updated last year
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
- redpwn's challenge deployment system☆28Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago
- 🕶 Design fun and insightful CTF challenges☆68Updated 3 years ago
- Official writeups for Hack The Boo CTF 2023☆45Updated 11 months ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆64Updated 2 years ago
- PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and t…☆48Updated this week
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated 2 weeks ago
- Challenges and writeups for PatriotCTF 2023☆25Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆167Updated last year
- Source code for the DEF CON 31 CTF Qualifiers.☆125Updated 2 years ago
- A curated list of argument injection vectors☆41Updated 10 months ago
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆14Updated 2 years ago
- Open source release of challenges and other code used in the Hack-A-Sat 2 Qualifier in 2021.☆67Updated 4 years ago
- ☆173Updated 3 years ago
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87Updated 2 years ago
- crypto-condor is a Python library for compliance testing of implementations of cryptographic primitives☆32Updated last month
- Binary Exploitation Phrack CTF Challenge☆69Updated 3 months ago
- Cheat sheet of binary protections flags☆25Updated 5 years ago