Source for some problems from PlaidCTF 2014.
☆59May 2, 2014Updated 11 years ago
Alternatives and similar repositories for plaidctf2014
Users that are interested in plaidctf2014 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14May 16, 2024Updated last year
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆400Aug 2, 2022Updated 3 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- CTF write-ups by Plaid Parliament of Pwning☆805Jun 4, 2024Updated last year
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- quals-2014☆21Nov 3, 2014Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Challenges used at the Cambridge 2 Cambridge event☆22May 26, 2016Updated 9 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- A very basic WSGI Handler for Mongrel2☆36Sep 5, 2010Updated 15 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Repo contains code for our DerbyCon 2016 talk comparing Binary Ninja and IDA Pro.☆10Sep 18, 2016Updated 9 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Jun 16, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Scanner for document roots/URLs.☆14Nov 17, 2011Updated 14 years ago
- Passive DHCP analyzer with OS fingerprinting on the LAN through DHCP☆13Nov 16, 2017Updated 8 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- some tasks/solutions from CTF challenges☆68Nov 9, 2016Updated 9 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1☆78Jan 24, 2016Updated 10 years ago
- ☆51Sep 23, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- RECon 2017 IDA skin & color scheme☆28Jun 16, 2017Updated 8 years ago
- ☆44Dec 23, 2014Updated 11 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago