CTF-PWN LEARNING MATERIALS
☆22Jun 25, 2024Updated last year
Alternatives and similar repositories for CTF-Challenges
Users that are interested in CTF-Challenges are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- 冰蝎3 流量 分析解密工具☆15Jan 8, 2022Updated 4 years ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆23Jul 16, 2022Updated 3 years ago
- ☆27Aug 19, 2024Updated last year
- Demo for vulnerable Nodejs project☆12Jul 6, 2024Updated last year
- BuckeyeCTF 2023 Challenges☆18Oct 2, 2025Updated 7 months ago
- Tutorial Linux x64 Assembly Bahasa Indonesia☆38May 21, 2024Updated last year
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- ☆15Mar 25, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Hacking ZXHN H108N Router (brute-force)☆12Mar 21, 2019Updated 7 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 6 months ago
- An XNU kernel race condition bug☆49Jan 30, 2025Updated last year
- Simple bot visitor service for XSS challenges in CTF☆11Nov 9, 2022Updated 3 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- Android App Reverse Engineering & Analysis Toolkit☆17Jul 10, 2024Updated last year
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- 一个将 vmnote 指令集重编译成 x64 指令集的脚本,并且可以用 IDA 进行分析。☆18Jul 12, 2021Updated 4 years ago
- ☆56Aug 30, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Source code for 'Software Exorcism' by Bill Blunden☆13Mar 30, 2017Updated 9 years ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- TCP1P CTF writeup☆31May 23, 2023Updated 2 years ago
- ARVO: an Atlas of Reproducible Vulnerabilities in Open source software.☆68Feb 16, 2026Updated 2 months ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 4 months ago
- Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)☆17Apr 29, 2021Updated 5 years ago
- ☆16Aug 26, 2024Updated last year
- The CTF challenges that I made☆16Mar 31, 2023Updated 3 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 11 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 11 months ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆16May 29, 2022Updated 3 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Sep 18, 2023Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 6 months ago