A collection for some scripts I used in CTF.
☆15Apr 4, 2018Updated 7 years ago
Alternatives and similar repositories for CTF-Scripts
Users that are interested in CTF-Scripts are comparing it to the libraries listed below
Sorting:
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- ☆17May 13, 2019Updated 6 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 10 months ago
- ☆12Dec 26, 2017Updated 8 years ago
- IDA Pro plugin to view Exports☆17Sep 21, 2018Updated 7 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- POC For CVE-2022-24483☆14Apr 12, 2022Updated 3 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Source-to-source transformation to call native symbolic execution library and SMT Kit☆32Jul 25, 2014Updated 11 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- ☆60Sep 27, 2023Updated 2 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- a pwn demo for easy manage a pwn server☆25Aug 3, 2016Updated 9 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- ☆38Nov 29, 2022Updated 3 years ago
- Yet another xinetd docker used to build pwnable challenges.☆37Jun 28, 2019Updated 6 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- Library for reading PDB files, both Windows and PortablePDBs.☆54Feb 19, 2025Updated last year
- Resources related to GitHub Security Lab☆15May 7, 2021Updated 4 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- Pulled out Linux kernel code to run in userland so they could be targeted by AFL and KLEE☆20Jan 29, 2020Updated 6 years ago
- Use Intel Pin tools to analysis binary.☆38Jul 19, 2015Updated 10 years ago
- The official repository of the Hex-Rays IDA Pro vulnerability scanner plugin.☆20Apr 30, 2013Updated 12 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Aug 17, 2019Updated 6 years ago
- A Security Operation Tool Based on Large Language Models 基于大语言模型的安全运营工具☆23Mar 20, 2024Updated last year
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆26Apr 24, 2022Updated 3 years ago
- Some tools for CTF off line☆19Nov 19, 2017Updated 8 years ago
- 自己ctf比赛的writeup☆19May 27, 2019Updated 6 years ago
- Mirror my talk materials☆47Oct 16, 2025Updated 4 months ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- CTF tools for RSA☆45Jun 24, 2016Updated 9 years ago
- The project black zone☆18Nov 9, 2017Updated 8 years ago