oranav / ctf-writeups
☆23Updated 4 years ago
Alternatives and similar repositories for ctf-writeups:
Users that are interested in ctf-writeups are comparing it to the libraries listed below
- Ditto.☆17Updated 4 years ago
- ☆30Updated 6 years ago
- 3D Accelerated Exploitation☆54Updated 5 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- Integrate the dharma grammar fuzzer into honggfuzz☆26Updated 7 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆16Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 3 years ago
- A project for simulating fuzzing such that analysis can be done on coverage/feedback/scaling mechanisms☆9Updated 4 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆19Updated 5 years ago
- defcon framework by SeoulPlusBadass☆18Updated 2 years ago
- Python module to help in exploitation of the FILE structure in C☆27Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 4 years ago
- ☆22Updated 5 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- expansion of afl-unicorn using c++☆28Updated 5 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆15Updated 4 years ago
- Tools released in CSS 2019☆38Updated 5 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- ☆36Updated 6 years ago
- ☆28Updated 6 years ago
- HITCON CTF 2018☆45Updated 6 years ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Updated 7 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 3 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Writeups of CTF challenges☆32Updated 4 years ago
- ☆17Updated 4 years ago
- Proof of Concept of TrustZone exploit☆16Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago