montrehack / challengesLinks
Source code from some of the challenges that were presented at http://montrehack.ca
☆35Updated last month
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- Manage building and deploying exploitation challenges with ease☆59Updated 3 months ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆102Updated 6 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆107Updated last year
- Exploitation challenges for CTF☆63Updated 7 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆141Updated last year
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆54Updated 9 years ago
- ☆21Updated last year
- A repository of previous info-sec presentations I've presented.☆163Updated last year
- Slack bot for challenge management in large teams☆60Updated 3 years ago
- ☆89Updated 7 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 11 months ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- Code Review Audit Script Scanner☆143Updated 4 months ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- ☆122Updated 7 years ago
- ☆53Updated 6 years ago
- Scripts I used during CTP☆68Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Guide to buffer overflows☆59Updated 4 years ago
- 35C3 Junior CTF pwnables☆149Updated 7 years ago
- Red Team Resources☆60Updated 7 years ago
- ☆16Updated 9 years ago
- Examples of FSB exploitable binaries that can be used to practice FSB.☆35Updated 4 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- ☆13Updated 6 years ago
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆101Updated 3 years ago