pearl / scrap
A simple CTF platform in a single binary
☆11Updated 4 years ago
Alternatives and similar repositories for scrap
Users that are interested in scrap are comparing it to the libraries listed below
Sorting:
- A memory allocator written in Assembly focused on speed and efficiency, making it fantastic for small programs.☆14Updated 5 years ago
- img -> txt -> img☆10Updated 4 years ago
- Repository for dealing with Malloc mangling functions☆11Updated 4 years ago
- CTF challenges from redpwnCTF 2019☆13Updated 5 years ago
- Assembly needs a modern makeover! Aski is a compiled programming language allowing programming as low abstraction as Assembly but a synta…☆24Updated 4 years ago
- ☆15Updated 5 years ago
- My undergraduate thesis☆21Updated 4 years ago
- Show syscall information for different architectures☆15Updated 7 years ago
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆41Updated last year
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Updated 2 years ago
- Demonstration of the Java System.arraycopy type confusion vulnerability☆22Updated 11 years ago
- ☆66Updated 5 years ago
- pwntools library implementation in c++☆47Updated 4 years ago
- single file ctf/exploit client library - python3, type annotated☆70Updated 2 years ago
- Improving reliability since 2016☆43Updated 8 years ago
- Original repo by samczsun was deleted || Why won't anyone fix me :(☆38Updated 7 years ago
- Industrial IR-based static analysis framework for Java bytecode☆165Updated last week
- A new Java decompiler☆17Updated 6 years ago
- ☆36Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆80Updated 4 years ago
- A framework for interacting with another JVM via reflection performed by an RMI server which is deployed by a Java Agent.☆12Updated 8 years ago
- symbolic execution engine for brainfuck because lol☆15Updated 8 years ago
- ☆10Updated 3 years ago
- CTF writeups☆42Updated 3 years ago
- Obfuscation of Fickleties for the Java Virtual Machine - A dataset of wacky obfuscation scenarios☆27Updated 3 years ago
- CTF challenges from redpwnCTF 2021☆31Updated 3 years ago
- ☆14Updated 5 years ago
- Where I write stuff.☆25Updated 3 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆24Updated 3 years ago
- Challenge archive☆23Updated last month