q3k / ctf
Stuff from CTF contests
☆39Updated 5 years ago
Alternatives and similar repositories for ctf:
Users that are interested in ctf are comparing it to the libraries listed below
- ☆49Updated 6 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆54Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆52Updated 6 months ago
- Hardware task for WCTF2019☆46Updated 4 years ago
- BADFET☆44Updated 7 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆33Updated 6 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆36Updated 9 years ago
- realtime cross-tool collaborative reverse engineering☆99Updated 2 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- Intel Management Engine firmware loader plugin for IDA☆90Updated 7 years ago
- Writeups for the RHME2 CTF☆11Updated 7 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆111Updated 6 years ago
- Binaryninja AVR architecture plugin with lifting☆42Updated last year
- Routines for hunting down kernel structs.☆40Updated 13 years ago
- Writeups for the RHME3 Challenges☆52Updated 6 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆26Updated 6 years ago
- RHme+ 2015 challenge☆109Updated 8 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Synesthesia, implemented as Yices scripts☆92Updated 7 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Updated 7 years ago
- Qiling Advanced Binary Emulation framework☆23Updated 4 years ago
- A BinaryNinja plugin to graph a BNIL instruction tree☆85Updated last year
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆86Updated 3 years ago