pwning / defcon25-public
Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals
☆140Updated 6 years ago
Alternatives and similar repositories for defcon25-public:
Users that are interested in defcon25-public are comparing it to the libraries listed below
- ☆82Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 6 years ago
- ☆89Updated 7 months ago
- ☆85Updated 4 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆158Updated 6 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆89Updated 9 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆163Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- IDA cLEMENCy Tools☆61Updated 7 years ago
- CTF writeups☆112Updated 7 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆124Updated 7 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- afl-fuzz for javascript☆205Updated 8 years ago
- ☆140Updated 7 years ago
- Some of my CTF solutions☆80Updated 5 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆161Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆160Updated 6 years ago
- Exploits for interesting CTF challenges I have worked on☆64Updated 8 years ago
- My CTF writeup☆25Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆215Updated 6 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆140Updated 5 years ago
- A collection of more than 1000 binary libc files☆87Updated 9 years ago
- fuzz☆125Updated 9 years ago
- Heap exploitation technique bypassing heap ASLR☆46Updated 5 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Updated 6 years ago
- windows kernel vulnerability found by me☆91Updated 7 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆146Updated 8 years ago