Materials for CTF101 Day 2 (Systems Security)
☆11Sep 11, 2017Updated 8 years ago
Alternatives and similar repositories for ctf101-systems-security-2017
Users that are interested in ctf101-systems-security-2017 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenges for NUS Greyhats CTF101 Web Security (2017)☆17Sep 9, 2017Updated 8 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Sep 19, 2016Updated 9 years ago
- Writeups for Pico CTF 2017 capture the flag hacking compeition☆14Mar 21, 2018Updated 8 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- This project has moved to https://github.com/torvalds/linux/tree/master/tools/memory-model☆12Jan 19, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- GryphonCTF 2016 Challenges Repository.☆17Sep 30, 2017Updated 8 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆20Jun 13, 2019Updated 6 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- ☆30Mar 31, 2017Updated 8 years ago
- Code from the book "FreeBSD Device Drivers: A Guide for the Intrepid"☆12Oct 10, 2016Updated 9 years ago
- Reverse engineering challenges☆52Nov 3, 2019Updated 6 years ago
- ☆19Jan 3, 2024Updated 2 years ago
- Address Book sample application (Level 2.5)☆11May 2, 2019Updated 6 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Shell scripts for decompiling and analyzing binary files through the retdec.com REST API.☆12Jun 17, 2018Updated 7 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 7 years ago
- Automatically generated litmus tests for validation LISA-language Linux-kernel memory models☆27Aug 17, 2025Updated 7 months ago
- Collate each contributor's code from multiple files☆11Jun 25, 2023Updated 2 years ago
- Fork of the Developer Tools for UPnP Technologies (http://opentools.homeip.net/dev-tools-for-upnp)☆13Aug 5, 2015Updated 10 years ago
- A dumb afl-fuzz triage tool.☆14Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Maciej Sypien personal dotfiles for macOS, Linux (ubuntu)☆11Jan 25, 2026Updated 2 months ago
- Go implementation of libhydrogen - a lightweight, easy-to-use crypto library☆24Mar 23, 2017Updated 9 years ago
- Simple reporting plugin for binary ninja☆16Oct 28, 2018Updated 7 years ago
- Set of usefull (or not) scripts used for reverse engineering Diablo 2 v1.14d game using Ghidra☆10Jan 26, 2022Updated 4 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- ☆24Mar 3, 2020Updated 6 years ago
- X-CTF 2016 Qualifiers Challenges Source☆12May 24, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- DC25 Party Badge☆11Aug 7, 2017Updated 8 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- An exploration into Steganography with Python☆14Mar 12, 2017Updated 9 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- Open source module builder for Singapore Universities☆11Jan 3, 2017Updated 9 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago