Tips, Tricks, and Suggestions for Running a CTF
☆400Aug 2, 2022Updated 3 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below
Sorting:
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- Source for some problems from PlaidCTF 2014.☆59May 2, 2014Updated 11 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 10 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- Build a database of libc offsets to simplify exploitation☆1,854Oct 23, 2024Updated last year
- ☆81Jun 12, 2017Updated 8 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- ☆14May 16, 2024Updated last year
- Repo for CSAW CTF 2016 Quals challenges☆74Sep 18, 2016Updated 9 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,820Jun 8, 2019Updated 6 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆507May 11, 2021Updated 4 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- CTF Challenge Framework for Windows 8 and above☆156Jul 14, 2021Updated 4 years ago
- ☆280May 21, 2020Updated 5 years ago
- Files from my DEFCON CTF VM.☆273Sep 6, 2016Updated 9 years ago
- Simplify format string exploitation.☆347Nov 2, 2021Updated 4 years ago
- Yet another CTF platform☆148Nov 29, 2017Updated 8 years ago
- Writeups and solutions for RC3CTF 2016☆14Nov 23, 2016Updated 9 years ago
- ☆16Aug 10, 2018Updated 7 years ago
- Library for creating CTF services.☆75Nov 11, 2016Updated 9 years ago
- A repository for learning various heap exploitation techniques.☆8,455Jan 15, 2026Updated last month
- Some setup scripts for security research tools.☆9,299Feb 22, 2026Updated last week
- Some CTF write up☆255Aug 29, 2025Updated 6 months ago
- ☆92Aug 18, 2024Updated last year
- ☆27Apr 6, 2018Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 8 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆125Jul 30, 2017Updated 8 years ago
- some notes on CTFs.☆25Feb 4, 2016Updated 10 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- For Linux binary Exploitation☆843Mar 26, 2018Updated 7 years ago