pwning / defcon25-public
Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals
☆140Updated 6 years ago
Alternatives and similar repositories for defcon25-public:
Users that are interested in defcon25-public are comparing it to the libraries listed below
- ☆89Updated 6 months ago
- Library for creating CTF services.☆74Updated 8 years ago
- ☆82Updated 7 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆158Updated 6 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 6 years ago
- VirtualBox 3D exploits & PoCs☆160Updated 6 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆124Updated 7 years ago
- afl-fuzz for javascript☆205Updated 8 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- Repo for CSAW CTF 2016 Quals challenges☆73Updated 8 years ago
- ☆85Updated 4 years ago
- ☆84Updated 8 years ago
- CTF writeups☆112Updated 7 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Updated 7 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆89Updated 9 years ago
- SymGDB - symbolic execution plugin for gdb☆215Updated 6 years ago
- CTF Writeups☆186Updated 7 years ago
- IDA cLEMENCy Tools☆61Updated 7 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆115Updated 5 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆163Updated 7 years ago
- ☆140Updated 7 years ago
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 6 years ago
- ☆122Updated 6 years ago
- A collection of more than 1000 binary libc files☆87Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- Repo for CSAW CTF 2018 Finals challenges☆58Updated 6 years ago
- ROPME is a set of python scripts to generate ROP gadgets and payload.☆146Updated 8 years ago
- Some of my CTF solutions☆80Updated 5 years ago
- Some kernel exploits☆144Updated 7 years ago