r4j0x00 / ctf-challenges
CTF challenges that I created
☆18Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for ctf-challenges
- Browser exploitation v8 and sandbox escape challenges with solutions.☆26Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 3 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆52Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆22Updated 7 months ago
- Cumulative cyclomatic complexity calculation for Ghidra☆20Updated 3 years ago
- Binary exploitation by confusing the unwinder☆59Updated last year
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆40Updated 3 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- Investigating the bug behind CVE-2021-26708☆26Updated 3 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆46Updated 8 months ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 2 years ago
- ☆100Updated last month
- WebGL fuzzer☆38Updated last year
- ☆30Updated last year
- Target components for kAFL/Nyx Fuzzer☆26Updated 2 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆58Updated last year
- A collection of web browser CTF challenges and solutions.☆25Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆25Updated 11 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆34Updated last year
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- ☆33Updated 3 years ago
- An automated setup for compiling & fuzzing Apache httpd server☆47Updated last year
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- ☆59Updated 9 months ago
- A tool to perform so called BGE attack☆21Updated 7 months ago
- Files used for reproducing Fuzzware's experiments☆54Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆106Updated last year
- ☆48Updated 2 years ago
- Breaking Secure Boot with SMM☆39Updated 2 years ago