pwning / plaidctf2014Links
Source for some problems from PlaidCTF 2014.
☆58Updated 11 years ago
Alternatives and similar repositories for plaidctf2014
Users that are interested in plaidctf2014 are comparing it to the libraries listed below
Sorting:
- Collection of software bugs found by SkyLined☆68Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- CTF & practice exploit collection☆38Updated 8 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆44Updated 7 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- Personal repository for all ctf related stuffs☆67Updated 8 months ago
- Exploits for interesting CTF challenges I have worked on☆65Updated 8 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Vagrant files to bootstrap VM for CTFs☆11Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 11 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆25Updated 8 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Updated 9 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- softScheck Cloud Fuzzing Framework☆58Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 7 years ago
- ☆34Updated 2 years ago
- Simple shellcode testing tool.☆49Updated 13 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 8 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- Unofficial American Fuzzy Lop repo☆25Updated 8 years ago
- PoC for CVE-2015-6086☆69Updated 9 years ago
- HitCon 2015 spartan 0day & exploit☆27Updated 9 years ago
- A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security In…☆52Updated 6 years ago
- ☆44Updated 10 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- ☆16Updated 6 years ago