polygl0ts / writeupsLinks
CTF writeups
☆42Updated 3 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆26Updated 8 years ago
- ☆111Updated 6 years ago
- A tool for finding the one gadget RCE in libc☆77Updated 5 years ago
- Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.☆138Updated last year
- ☆26Updated 7 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆223Updated 7 months ago
- Cross-architecture instruction counting for CTF solving☆48Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆198Updated last year
- Automatic ROPChain Generation☆294Updated 5 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆129Updated 8 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆51Updated 2 years ago
- Reproduce CVEs from ForAllSecure Vulnerabilities Lab☆116Updated last month
- Lazy python wrapper of KLEE for solving CTF challenges☆64Updated 5 years ago
- Slides from our technical talks☆29Updated 4 months ago
- ☆159Updated 6 years ago
- ☆52Updated 4 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆203Updated 5 years ago
- An interactive memory info for pwning / exploiting☆98Updated 2 years ago
- An experimental high performance, fuzzing oriented Intel Processor Trace capture and analysis suite☆131Updated 3 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Updated 6 years ago
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆42Updated 2 years ago
- my writeups (mainly pwnable)☆35Updated last year
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Updated 4 years ago
- Differential fuzzing for Smart Contract VMs☆52Updated 3 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated 3 months ago
- GlibC Malloc for Exploiters presentation☆152Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- ☆27Updated 3 years ago
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Updated 5 years ago