CTF writeups
☆42Feb 26, 2026Updated 3 weeks ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Webring for current and past members of ETH Zurich 🎓☆17Jan 26, 2026Updated last month
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- EBNF parsing toolset☆10May 20, 2023Updated 2 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Source files and writeups for UTCTF 2019☆14Oct 21, 2020Updated 5 years ago
- An OCaml extension for RISC-V☆16Nov 6, 2020Updated 5 years ago
- to show pocs found☆10Jul 16, 2025Updated 8 months ago
- write up for pwnable.kr☆24Nov 1, 2017Updated 8 years ago
- ☆16May 31, 2025Updated 9 months ago
- ☆13Nov 1, 2017Updated 8 years ago
- How to use boost, CGAL, and ideas for solving the Algolab lecture exercises☆22Jan 26, 2024Updated 2 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- RISC-V BSV Specification☆23Jan 18, 2020Updated 6 years ago
- Naehrig, Niederhagen and Schwabe's pairings code, massaged into a shared library.☆18Apr 19, 2016Updated 9 years ago
- ☆13Aug 28, 2018Updated 7 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆75Nov 27, 2021Updated 4 years ago
- Collect some PoC that I writted .记录自己写过的PoC ..☆22Dec 20, 2017Updated 8 years ago
- FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Re…☆12Nov 16, 2022Updated 3 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Apr 4, 2016Updated 9 years ago
- drchrono API example using django☆11Feb 11, 2025Updated last year
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- A python script to add Songs from Spotify Playlists to YouTube Playlists.☆10Mar 1, 2023Updated 3 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- Cryptris, a game about asymmetric cryptography☆18Sep 6, 2014Updated 11 years ago
- Shamir's secret-sharing method in the Galois Field GF(2**8), modified implementation of the original by Daniel Silverstone☆10Jun 11, 2020Updated 5 years ago
- ARM is Turing-complete without data fetches☆19Mar 22, 2018Updated 7 years ago
- Writeups for HITCON CTF 2020☆10Nov 29, 2020Updated 5 years ago
- Extract data of TTD trace file to a minidump☆30Jul 31, 2023Updated 2 years ago
- Stub for polymorphic code☆11Mar 18, 2023Updated 3 years ago
- Recover mutation graph from an AFL seed☆60Jan 6, 2021Updated 5 years ago
- All my solutions to Clash of Code (Codingame.com)☆11Jun 10, 2021Updated 4 years ago
- ☆18May 31, 2022Updated 3 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago