☆52Nov 22, 2021Updated 4 years ago
Alternatives and similar repositories for CTF-writeups
Users that are interested in CTF-writeups are comparing it to the libraries listed below
Sorting:
- Breaking secure checksums in the scudo heap allocator☆14Apr 9, 2020Updated 5 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆50Dec 31, 2023Updated 2 years ago
- Some CTF write up☆255Aug 29, 2025Updated 5 months ago
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- ☆21Apr 2, 2024Updated last year
- A little WinDbg extension to help dump the state of Win32k Type Isolation structures.☆38Feb 2, 2018Updated 8 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- 이 프로젝트는 업무망과 인터넷망으로 분리된 망간자료전송 솔루션의 인터넷망용 클라이언트를 개발합니다.☆18Nov 13, 2020Updated 5 years ago
- Write-ups from A*0*E.☆199May 12, 2020Updated 5 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 8 years ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆37Aug 12, 2020Updated 5 years ago
- Various CTF challenge solutions☆12Apr 20, 2021Updated 4 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- ☆12Aug 16, 2022Updated 3 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- my automatic exploit generation (DEPRECATED)☆60Jun 21, 2016Updated 9 years ago
- ☆44Jun 17, 2020Updated 5 years ago
- ☆176May 2, 2019Updated 6 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Sep 5, 2012Updated 13 years ago
- WCTF2019 challenge: Gyotaku The Flag☆41Jul 13, 2019Updated 6 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- TLE for avoiding TLE☆10Sep 12, 2022Updated 3 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 10 months ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- ☆29May 13, 2018Updated 7 years ago
- macOS Kernel Exploit for CVE-2019-8781.☆293Oct 15, 2019Updated 6 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- My solutions for CTF challenges☆75Dec 16, 2025Updated 2 months ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Exp of cve-2019-12272☆20Jul 10, 2019Updated 6 years ago
- Fuzzilli For quickjs☆28Sep 16, 2019Updated 6 years ago
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆15Sep 4, 2019Updated 6 years ago
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- ☆13Jun 26, 2019Updated 6 years ago