CTF writeups
☆42Mar 28, 2022Updated 3 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Webring for current and past members of ETH Zurich 🎓☆16Jan 26, 2026Updated last month
- iOS/macOS: task_swap_mach_voucher() does not respect MIG semantics leading to use-after-free☆11Jan 30, 2019Updated 7 years ago
- ☆13Nov 1, 2017Updated 8 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- My submission for WWDC'21 Swift Student Challenge which was selected.☆18Jun 1, 2021Updated 4 years ago
- Legacy version of GEF running for GDB+Python2☆18Jul 21, 2023Updated 2 years ago
- Wrappers around Rust's integer to check for constant-time-compatible usage☆23Mar 13, 2020Updated 5 years ago
- The Android Runtime Instrumentation Toolkit☆25Aug 20, 2016Updated 9 years ago
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- Detect patterns of bad behavior in function calls☆25Jul 21, 2020Updated 5 years ago
- write up for pwnable.kr☆24Nov 1, 2017Updated 8 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 7 years ago
- VoteSecure, Free & Fair's core cryptographic library for the Mobile Voting Project☆61Feb 7, 2026Updated 3 weeks ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆75Nov 27, 2021Updated 4 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- ☆32Apr 22, 2019Updated 6 years ago
- ☆36Nov 11, 2018Updated 7 years ago
- Root Repo for the EPOXY tool that applies Privilege Overlays on bare-metal systems☆31May 18, 2017Updated 8 years ago
- A re-implementation of the Cuphead expert mode with all-new content☆12Nov 11, 2024Updated last year
- ☆35Sep 18, 2015Updated 10 years ago
- A python script to add Songs from Spotify Playlists to YouTube Playlists.☆10Mar 1, 2023Updated 2 years ago
- PoC for CVE-2017-0075☆37Sep 12, 2019Updated 6 years ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated 11 months ago
- High Level API on top of the R2Pipe interface☆44Nov 15, 2025Updated 3 months ago
- Voice command assistant☆38Nov 16, 2016Updated 9 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- All my solutions to Clash of Code (Codingame.com)☆11Jun 10, 2021Updated 4 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆48Jun 30, 2020Updated 5 years ago
- ☆37Jun 7, 2019Updated 6 years ago