pwning / defcon25-public
Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals
☆141Updated 6 years ago
Alternatives and similar repositories for defcon25-public:
Users that are interested in defcon25-public are comparing it to the libraries listed below
- ☆82Updated 7 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆90Updated 9 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- ☆89Updated 8 months ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆124Updated 7 years ago
- SymGDB - symbolic execution plugin for gdb☆216Updated 6 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Updated 8 years ago
- ☆85Updated 5 years ago
- CTF writeups☆112Updated 7 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆157Updated 7 years ago
- Some of my CTF solutions☆80Updated 5 years ago
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- Nosy Newt is a simple concolic execution tool for exploring the input space of a binary executable program based in Triton☆61Updated 7 years ago
- A collection of more than 1000 binary libc files☆88Updated 10 years ago
- IDA cLEMENCy Tools☆61Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆180Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 9 years ago
- CTF Writeups☆186Updated 7 years ago
- DARPA Cyber Grand Challenge Documentation☆116Updated 8 years ago
- Certified Edible Dinosaurs official CTF toolkit☆121Updated 7 years ago
- An open source, multi-architecture ROP compiler written in python☆162Updated 7 years ago
- ☆236Updated 6 years ago
- Differential fuzzing for the masses!☆152Updated 7 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆83Updated 6 years ago
- VirtualBox 3D exploits & PoCs☆161Updated 6 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- My CTF writeup☆26Updated 8 years ago