nongiach / ctf_challsLinks
All challenges I created for CTF
☆12Updated 4 years ago
Alternatives and similar repositories for ctf_challs
Users that are interested in ctf_challs are comparing it to the libraries listed below
Sorting:
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Updated 4 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- ☆21Updated 6 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Updated 2 years ago
- ☆101Updated 4 years ago
- ☆26Updated last month
- Firmware analysis website + API☆43Updated 5 years ago
- ☆43Updated 7 years ago
- A fuzzing script for MitmProxy☆24Updated 10 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Simple vulnerability scanning framework☆51Updated 9 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆46Updated 8 years ago
- ☆14Updated 6 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 6 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- public exploits☆35Updated 2 years ago