ritsec / RITSEC-CTF-2019
Repo to archive the 2019 RITSEC CTF Challenges & Documentation
☆33Updated 4 years ago
Alternatives and similar repositories for RITSEC-CTF-2019
Users that are interested in RITSEC-CTF-2019 are comparing it to the libraries listed below
Sorting:
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆105Updated 8 months ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- ☆135Updated 5 years ago
- Code and exercises for a workshop on z3 and angr☆227Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- ☆109Updated 5 years ago
- Automatic ROPChain Generation☆286Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- ☆73Updated 10 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- ☆62Updated 10 months ago
- ☆107Updated 6 years ago
- esoteric☆52Updated 4 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆93Updated 3 weeks ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Updated 6 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆60Updated last month
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆159Updated 5 years ago
- ☆154Updated 6 years ago
- Writeups for CTF challenges☆31Updated last year
- ☆50Updated 6 years ago
- POC for cve-2019-1458☆174Updated 3 years ago
- ☆115Updated last year
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated last month
- Exploitation and Mitigation Slides☆128Updated 11 months ago
- ☆48Updated 3 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆208Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago
- ☆110Updated 4 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Updated 5 years ago