CTF Finals
☆17Nov 14, 2017Updated 8 years ago
Alternatives and similar repositories for CSAW-CTF-2017-Finals
Users that are interested in CSAW-CTF-2017-Finals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repo for CSAW CTF 2018 Quals challenges☆44Sep 17, 2017Updated 8 years ago
- A demonstration of how page tables can be used to run arbitrary code in ring-0 and lead to a privesc. Uses CVE-2016-7255 as an example.☆11Jun 11, 2018Updated 7 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- A bootloader imgdata unpacker for Nexus 4, 5 and 7 smartphones as well as imgdata tool for Nexus 5.☆26Aug 5, 2017Updated 8 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- All the files needed for the Terrapin Hackers Hacktorial on Behavioral Cloning for Self Driving Cars.☆13Jan 16, 2018Updated 8 years ago
- Academie en ligne de CyberDefense pour la jeunesse du continent Africain.☆18Oct 6, 2020Updated 5 years ago
- CTF write-ups / solution scripts☆23Nov 4, 2018Updated 7 years ago
- Simplified Assembly Loader - a small tool to run (headerless) machine code.☆45Apr 16, 2017Updated 8 years ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆53Aug 12, 2018Updated 7 years ago
- slides, exercises, cheatsheet and instructions for my ROP-Workshop☆19Dec 27, 2019Updated 6 years ago
- Repository For CTF Write-ups☆17Sep 11, 2023Updated 2 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Nov 12, 2017Updated 8 years ago
- Tool to display a Windows 8+ process mitigation policy☆12Jul 9, 2025Updated 8 months ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆81Sep 1, 2018Updated 7 years ago
- A plugin for Binary Ninja containing tools for iOS reversing☆30Aug 3, 2017Updated 8 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- An Anti-Rootkit implemented using Intel VT-x☆40Feb 22, 2019Updated 7 years ago
- ☆13Oct 29, 2012Updated 13 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Just another tool to download specify Symbol (.pdb) files☆39Sep 4, 2019Updated 6 years ago
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Jun 11, 2019Updated 6 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- ☆11Feb 21, 2016Updated 10 years ago
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hosting your own Machine Learning Model as a Microservice☆16Dec 16, 2022Updated 3 years ago
- Memory inspection REPL interface☆45Oct 14, 2017Updated 8 years ago
- zygotebench - benchmark process creation speed on Android☆14Dec 4, 2013Updated 12 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- Punch firewall holes to connect TCP, SCTP and UDP between network peers☆13Jun 4, 2020Updated 5 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- macOS Private KPI Symbol Resolver☆49Feb 21, 2017Updated 9 years ago