montrehack / challengesLinks
Source code from some of the challenges that were presented at http://montrehack.ca
☆35Updated 9 months ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- Exploitation challenges for CTF☆63Updated 7 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆52Updated 9 years ago
- ☆21Updated last year
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Updated 7 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆136Updated last year
- Manage building and deploying exploitation challenges with ease☆59Updated 3 weeks ago
- A pwning environment, now on docker!☆18Updated 4 years ago
- ☆13Updated 6 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- Here are the challenges (including sources) of the GreHack CTF.☆106Updated last year
- Guide to buffer overflows☆59Updated 4 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆38Updated 2 years ago
- Code Review Audit Script Scanner☆141Updated last month
- Red Team Resources☆60Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- ☆101Updated 4 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- A repository of previous info-sec presentations I've presented.☆162Updated last year
- ☆16Updated 8 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- justCTF 2019 challenges sources☆40Updated 4 years ago
- ☆21Updated 3 years ago
- Scripts I used during CTP☆68Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 11 months ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- ☆26Updated 2 months ago
- Reverse engineering challenges☆52Updated 6 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- ☆122Updated 7 years ago