q3k / ctfLinks
Stuff from CTF contests
☆39Updated 6 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- Scout - Instruction based research debugger (a poor man's debugger)☆155Updated 2 years ago
- Migrated to Codeberg☆46Updated 4 years ago
- realtime cross-tool collaborative reverse engineering☆102Updated 2 years ago
- RHme+ 2015 challenge☆111Updated 9 years ago
- L1TF (Foreshadow) VM guest to host memory read PoC☆112Updated 6 years ago
- ☆49Updated 7 years ago
- Protostart Stack Overflow Challenges compiled for ARMv6.☆56Updated 7 years ago
- BADFET☆45Updated 8 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- cLEMENCy is the LEgitbs Middle ENdian Computer architecture developed by Lightning for DEF CON CTF 2017☆123Updated 8 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- X41 Smartcard Fuzzer☆119Updated 6 years ago
- Routines for hunting down kernel structs.☆41Updated 14 years ago
- Writeups for the RHME3 Challenges☆52Updated 6 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- A code skeleton of Samsung's Shannon S5000 baseband modem.☆46Updated 5 years ago
- Some kernel exploits☆144Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆55Updated last year
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- Exploitation on ARM-based Systems (Troopers18)☆149Updated 7 years ago
- CSAW Embedded Security Challenge 2019☆34Updated 5 years ago
- Tools for analyzing hexagon code☆39Updated 9 years ago
- Intel Management Engine firmware loader plugin for IDA☆93Updated 8 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16Updated 3 months ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 7 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- An interactive memory info for pwning / exploiting☆99Updated 2 years ago