picoCTF / start-problem-devLinks
Everything (examples, docs, references, ...) to start developing problems for the cmgr framework
☆18Updated 2 months ago
Alternatives and similar repositories for start-problem-dev
Users that are interested in start-problem-dev are comparing it to the libraries listed below
Sorting:
- CTF Challenge Manager☆18Updated 2 years ago
- ☆46Updated 2 weeks ago
- ☆146Updated 9 months ago
- ☆362Updated last year
- Textbook with chapters for each usual picoCTF challenge category.☆45Updated 3 months ago
- Course materials for hackaday.io Ghidra training☆418Updated last year
- CTF writeups from The Flat Network Society☆151Updated 5 months ago
- A list of resources for those interested in hardware, embedded, and IoT security☆72Updated last year
- Gray Hat Hacking v6☆194Updated last year
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 5 years ago
- ☆118Updated last year
- The platform used to run picoCTF 2019. (deprecated)☆310Updated last year
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆229Updated last year
- Hack-A-Sat Qualifiers Writeups☆257Updated 2 years ago
- Reverse Engineering Resources☆230Updated 7 years ago
- Challenges and writeups for the US Cyber Open for 2024☆20Updated last year
- DC540 hacking challenge 0x00001.☆26Updated 3 weeks ago
- Learn Binary Exploitation with sample problems and solutions☆168Updated 2 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- Docker container for quickly analyzing Linux malware☆82Updated 2 years ago
- Damn Vulnerable IoT Device☆214Updated last year
- Example pwnable challenge hosted with docker☆228Updated last year
- Public library of space documents and tutorials☆837Updated last year
- Infrastructure powering the pwn.college dojo☆417Updated this week
- Infosec blog☆142Updated 3 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- knowledge is power☆228Updated 4 months ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆23Updated 7 years ago
- Hardware Hacking Cheatsheet infograph☆156Updated last year
- The best resources for learning exploit development☆120Updated 6 years ago