reductor / dice-ctf-2022-breach-writeupView external linksLinks
Dice CTF 2022 breach write-up
☆15Feb 14, 2022Updated 4 years ago
Alternatives and similar repositories for dice-ctf-2022-breach-writeup
Users that are interested in dice-ctf-2022-breach-writeup are comparing it to the libraries listed below
Sorting:
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 4 years ago
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 9 months ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- derper's mom☆13Oct 28, 2025Updated 3 months ago
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 3 years ago
- Legacy IDAPython project for Hex-Ray's IDA Pro, now maintained as part of the IDA SDK.☆34Sep 8, 2025Updated 5 months ago
- clfs CVE 的一些 POC 收集☆16Oct 27, 2022Updated 3 years ago
- ☆24Sep 13, 2022Updated 3 years ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Dec 6, 2025Updated 2 months ago
- ☆16Apr 12, 2023Updated 2 years ago
- ☆15Dec 27, 2022Updated 3 years ago
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- POC for CLFS CVE-2022-24481☆14May 14, 2023Updated 2 years ago
- IrisCTF 2023 challenges.☆16Jan 23, 2023Updated 3 years ago
- ☆12May 24, 2022Updated 3 years ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆21May 17, 2022Updated 3 years ago
- substrate framework for android based on frida☆17May 15, 2020Updated 5 years ago
- iot安全题目学习记录☆16Dec 13, 2021Updated 4 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆23Nov 12, 2019Updated 6 years ago
- ☆17Mar 9, 2023Updated 2 years ago
- ☆16Jun 9, 2023Updated 2 years ago
- minimum ELF64 program to calculate its own SHA256.☆18Aug 22, 2022Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Rust bindings fo the Apple Silicon Hypervisor.framework☆49Jan 14, 2026Updated last month
- Advanced usage of the ptrace syscall in order to implement a more resistent anti debugging feature☆17Jan 7, 2017Updated 9 years ago
- iOS逆向笔记☆18Dec 17, 2023Updated 2 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 5 months ago
- A collection of resources and information about CVE-2023-2033☆19Aug 13, 2023Updated 2 years ago
- The CTF challenges that I made☆18Mar 31, 2023Updated 2 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆187Jul 28, 2022Updated 3 years ago
- Frida module to continue stalking on pthread_create☆20Jan 23, 2020Updated 6 years ago
- Painless C++ vtables & classes☆20Sep 21, 2022Updated 3 years ago
- A mini bytecode Interpreter for v8.☆23Nov 14, 2022Updated 3 years ago