ptr-yudai / ptrlibLinks
Python library for CTFer
☆155Updated 3 weeks ago
Alternatives and similar repositories for ptrlib
Users that are interested in ptrlib are comparing it to the libraries listed below
Sorting:
- PAWNYABLE!☆218Updated last year
- Write-ups for various CTF☆199Updated last month
- small cute utils for kernel challenges☆39Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆558Updated this week
- kernel-pwn and writeup collection☆667Updated 2 years ago
- A bunch of V8 resources (with a security focus)☆61Updated 2 weeks ago
- Kernel development & exploitation practice environment.☆239Updated 2 years ago
- Source code for the DEF CON 30 CTF Qualifiers.☆264Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆130Updated last year
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆235Updated last year
- ropr with some tweaks for better linux kernel support☆31Updated 6 months ago
- ☆32Updated 4 years ago
- ☆41Updated 3 years ago
- A full English version of the popular ctf-wiki☆103Updated last year
- angr tutorial for ctf☆158Updated 4 years ago
- ☆21Updated last month
- A tool for automating setup of kernel pwn challenges☆60Updated this week
- Collection of browser challenges☆138Updated 4 years ago
- Source code and documentation for TeamItaly CTF 2022 challenges☆42Updated 2 years ago
- Windows Pwnable Study☆383Updated 4 months ago
- a new class of file structure attacks☆55Updated 2 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆22Updated 8 months ago
- CTF Reversing Challenges List☆286Updated 6 years ago
- ☆172Updated 3 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- Challenges from pbctf 2020☆34Updated 4 years ago
- Source code for the DEF CON 31 CTF Qualifiers.☆124Updated 2 years ago
- repository for kernel exploit practice☆410Updated 5 years ago
- ☆45Updated last month
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22Updated 3 years ago