CTF-PWN LEARNING MATERIALS
☆22Jun 25, 2024Updated last year
Alternatives and similar repositories for CTF-Challenges
Users that are interested in CTF-Challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- ☆23Jul 16, 2022Updated 3 years ago
- ☆12Apr 3, 2022Updated 3 years ago
- BuckeyeCTF 2023 Challenges☆18Oct 2, 2025Updated 5 months ago
- Echo Hack The Talk Materials 2019☆12Sep 12, 2019Updated 6 years ago
- Tutorial Linux x64 Assembly Bahasa Indonesia☆38May 21, 2024Updated last year
- ☆13Dec 14, 2021Updated 4 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.☆31Nov 4, 2018Updated 7 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- ☆15Mar 25, 2017Updated 8 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- An XNU kernel race condition bug☆47Jan 30, 2025Updated last year
- Simple bot visitor service for XSS challenges in CTF☆11Nov 9, 2022Updated 3 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Website that allows everyone to dive into the raw data behind weather predictions☆18Aug 13, 2024Updated last year
- 一个将 vmnote 指令集重编译成 x64 指令集的脚本,并且可以用 IDA 进行分析。☆17Jul 12, 2021Updated 4 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- ☆56Aug 30, 2022Updated 3 years ago
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 8 years ago
- A mitmproxy addon that allows use of the HTTP Toolkit Android app.☆10Jun 25, 2023Updated 2 years ago
- TCP1P CTF writeup☆32May 23, 2023Updated 2 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 3 months ago
- The CTF challenges that I made☆18Mar 31, 2023Updated 2 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)☆17Apr 29, 2021Updated 4 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- SAP penetration testing Web and network cheatsheet☆17May 15, 2022Updated 3 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Sep 18, 2023Updated 2 years ago
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Jul 6, 2019Updated 6 years ago
- A two-party secure function evaluation using Yao's garbled circuit protocol☆79Jun 12, 2024Updated last year