pwning / plaidctf2014View external linksLinks
Source for some problems from PlaidCTF 2014.
☆59May 2, 2014Updated 11 years ago
Alternatives and similar repositories for plaidctf2014
Users that are interested in plaidctf2014 are comparing it to the libraries listed below
Sorting:
- ☆14May 16, 2024Updated last year
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆400Aug 2, 2022Updated 3 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- A set of IDA Pro scripts to make Tree of Savior client reverse engineering easier☆18Dec 29, 2015Updated 10 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Challenges used at the Cambridge 2 Cambridge event☆22May 26, 2016Updated 9 years ago
- asp命令执行webshell☆19Oct 27, 2014Updated 11 years ago
- MD5 algorithm implementation - x86 assembler☆25Mar 15, 2015Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- ☆13Dec 3, 2022Updated 3 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Jun 16, 2015Updated 10 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- ☆27Jul 29, 2013Updated 12 years ago
- Source code and sample exploits for the Stripe CTF Winter 2012☆44Mar 19, 2012Updated 13 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago