mitre-cyber-academy / 2024-ectf-insecure-example
Insecure reference example for the 2024 Collegiate eCTF
☆31Updated 10 months ago
Alternatives and similar repositories for 2024-ectf-insecure-example:
Users that are interested in 2024-ectf-insecure-example are comparing it to the libraries listed below
- 'Ike: A binary exploitation and reversing handbook.☆73Updated last month
- General purpose attack-defense range for zero-config deployment☆20Updated 3 months ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆38Updated last year
- ☆177Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆93Updated 5 months ago
- ☆124Updated last year
- Write ups for Ph0wn CTF☆41Updated 2 months ago
- Challenges created for the US Cyber Open 2023 (Season 3)☆11Updated last year
- United States Air Force Academy public tools☆18Updated 3 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆142Updated 3 months ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- A tool for firmware cartography☆145Updated 2 months ago
- ☆122Updated last year
- ☆47Updated 9 months ago
- Challenges and writeups for PatriotCTF 2023☆24Updated last year
- RE / Binary Exploitation Resources☆69Updated 7 years ago
- ☆84Updated 9 months ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆11Updated last year
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- A script to download all the challenges and files from the CTFd instance.☆55Updated 7 months ago
- Rust out-of-tree Linux Kernel Modules (LKMs) experimentation framework☆40Updated last year
- An educational Bochs-based snapshot fuzzer project☆166Updated 2 months ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆66Updated 3 years ago
- Code snippets for bare-metal malware development☆97Updated 3 years ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆41Updated last year
- Toolkit for creating cryptographic figures and videos.☆31Updated 9 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆29Updated 2 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆46Updated 2 years ago
- Ghidra scripts for malware analysis☆91Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆75Updated last month