s41nt0l3xus / CTF-writeupsLinks
CTF writeups
☆16Updated 2 months ago
Alternatives and similar repositories for CTF-writeups
Users that are interested in CTF-writeups are comparing it to the libraries listed below
Sorting:
- Source code for the DEF CON 33 CTF Qualifiers.☆57Updated 5 months ago
- ☆36Updated last year
- Source code for the DEF CON 32 CTF Qualifiers.☆76Updated last year
- A bunch of V8 resources (with a security focus)☆94Updated this week
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆21Updated 5 months ago
- A tool for automating setup of kernel pwn challenges☆62Updated 3 months ago
- a new class of file structure attacks☆58Updated 3 years ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Updated 7 months ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆101Updated 3 weeks ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆175Updated last year
- Linux kernel privilege escalation techniques☆152Updated last year
- ☆21Updated 10 months ago
- ☆111Updated last year
- ☆270Updated 6 months ago
- Source code for the DEF CON 31 CTF Qualifiers.☆127Updated 2 years ago
- ☆103Updated last month
- Collection of browser challenges☆139Updated 4 years ago
- Source for challenges from bi0sCTF☆49Updated 7 months ago
- Repo for talk slides & materials☆21Updated last year
- Challenge source code and author write-ups for KalmarCTF☆70Updated last month
- ☆23Updated 2 weeks ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Updated 7 months ago
- ☆17Updated 3 years ago
- ☆17Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆242Updated last year
- CTF pwn problem writeup☆40Updated 2 years ago
- Infrastructure for the Potluck CTF☆25Updated last year
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Updated last year
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22Updated 3 years ago
- Challenges and solutions for Maple CTF 2022.☆28Updated 3 years ago