o-o-overflow / archiveooo
In service of posteriority
☆43Updated 2 years ago
Related projects: ⓘ
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- ☆20Updated 2 years ago
- Git repo for challenges of encryptCTF 2019☆21Updated 5 years ago
- ☆35Updated 3 years ago
- Set of pre-generated pwn.college challenges☆58Updated last year
- Source files and writeups for UTCTF 2020☆35Updated 4 years ago
- Slides from our technical talks☆25Updated last week
- SSD Challenges☆47Updated last year
- ☆24Updated 3 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 2 years ago
- Dockerized setup for quick pwning☆23Updated 3 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- Pwn2Win 2020 Challenges☆54Updated 3 years ago
- king of the hill cybersecurity competition☆26Updated 2 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated last year
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Resources for Browser Security Research☆21Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆55Updated last year
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- esoteric☆50Updated 4 years ago
- ☆47Updated this week
- ☆23Updated this week
- Detailed writeups of how I solved infosec Capture The Flag (CTF) challenges☆50Updated 3 years ago
- 🕶 Design fun and insightful CTF challenges☆53Updated 2 years ago
- ☆46Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆56Updated 4 years ago
- tools for shellcoding☆52Updated last year
- Slack bot for challenge management in large teams☆60Updated last year
- A series of writes about “Binary Exploitation”.☆87Updated last year
- Cheat sheet of binary protections flags☆22Updated 4 years ago