Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise
☆64May 21, 2023Updated 2 years ago
Alternatives and similar repositories for ctf-vs-the-real-world
Users that are interested in ctf-vs-the-real-world are comparing it to the libraries listed below
Sorting:
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- This repository is an interactive collection of my solutions to various XSS challenges.☆13Oct 25, 2020Updated 5 years ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- justCTF 2019 challenges sources☆41Jun 9, 2021Updated 4 years ago
- CTF write-ups / solution scripts☆23Nov 4, 2018Updated 7 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- ☆34Apr 14, 2025Updated 11 months ago
- ☆31Dec 5, 2024Updated last year
- Security feed, done in the stupid simple way☆27Jan 8, 2025Updated last year
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Jan 27, 2021Updated 5 years ago
- JDB++ an jdb extension for easily debugging through smali code☆23Jul 18, 2025Updated 8 months ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- ☆22Dec 1, 2025Updated 3 months ago
- weggli ruleset scanner for source code and binaries☆39Nov 16, 2025Updated 4 months ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- JavaScript (Node) Call Flooder☆13Mar 11, 2021Updated 5 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- Webkit Browser Exploitation Framework written in Javascript☆11Mar 3, 2019Updated 7 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- [ICSE2020] UAFL DataSet☆12Dec 10, 2022Updated 3 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆226May 6, 2023Updated 2 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆115Feb 2, 2023Updated 3 years ago
- Small scripts to simplify network communication☆27Dec 27, 2020Updated 5 years ago
- BINARLY Research Tools and PoCs☆40Sep 27, 2024Updated last year
- ☆14Mar 9, 2026Updated last week
- ☆22Jul 6, 2018Updated 7 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )☆32Nov 3, 2019Updated 6 years ago
- A git server implementation using isomorphic-git (WIP)☆15Dec 7, 2019Updated 6 years ago
- A Low Level IL emulator for Binary Ninja☆41Feb 5, 2019Updated 7 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆33May 2, 2019Updated 6 years ago