ritsec / RITSEC-CTF-2019Links
Repo to archive the 2019 RITSEC CTF Challenges & Documentation
☆33Updated 4 years ago
Alternatives and similar repositories for RITSEC-CTF-2019
Users that are interested in RITSEC-CTF-2019 are comparing it to the libraries listed below
Sorting:
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆105Updated 9 months ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- Writeups for CTF challenges☆31Updated last year
- Go Lang Portable Executable Parser☆39Updated 4 years ago
- esoteric☆54Updated 4 years ago
- ☆154Updated 6 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆208Updated 4 years ago
- A library for patching ELFs☆56Updated 4 years ago
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- ☆116Updated 4 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆120Updated 6 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆228Updated 2 years ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆186Updated 3 years ago
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆92Updated 3 years ago
- Automatic ROPChain Generation☆288Updated 5 years ago
- ☆48Updated 3 years ago
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- Cross-architecture instruction counting for CTF solving☆47Updated 3 years ago
- ☆74Updated 11 months ago
- ☆12Updated 3 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- ☆50Updated 6 years ago
- Write-ups for FireEye's FLARE-On challenges☆25Updated 5 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆189Updated last year
- ☆161Updated 3 years ago
- ☆135Updated 5 years ago
- Repository of exploits for research purposes☆13Updated last year
- ☆62Updated 11 months ago