Wiki-like CTF write-ups repository, maintained by the community. 2015
☆56Sep 9, 2015Updated 10 years ago
Alternatives and similar repositories for write-ups-2015
Users that are interested in write-ups-2015 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27May 29, 2015Updated 10 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆51Feb 9, 2026Updated 2 months ago
- AFL, with scripts to support other architectures.☆97Nov 7, 2018Updated 7 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 9 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- QEMU modified to run CGC binaries.☆13Apr 12, 2022Updated 3 years ago
- AFL, modified to support multi-CB challenge sets for CGC.☆19Aug 20, 2016Updated 9 years ago
- A pip wrapper around AFL.☆87Apr 12, 2021Updated 4 years ago
- POV templates and compilation support for CGC binaries.☆10May 19, 2022Updated 3 years ago
- Any useful windbg plugins I've written.☆118Apr 10, 2018Updated 8 years ago
- Shellphish's automated patching engine, originally created for the Cyber Grand Challenge.☆265Jan 13, 2026Updated 2 months ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆652Jan 12, 2026Updated 2 months ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆19Dec 19, 2019Updated 6 years ago
- Targeted patcher for CGC binaries. CGrex was used only during the CGC qualifier event, and is OBSOLETE. For the CFE, we used patcherex (g…☆15Sep 2, 2016Updated 9 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- ☆20Jul 18, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆40Jan 24, 2016Updated 10 years ago
- Driller: augmenting AFL with symbolic execution!☆969Mar 24, 2025Updated last year
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- QEMU VM with generic KVM extensions for symbolic execution☆26Updated this week
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Exploit Android MSM8974 Chipset☆14Aug 20, 2015Updated 10 years ago
- PathArmor context-sensitive CFI implementation☆46Oct 26, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Pixel bootlaoder exploit for reading flash storage☆31Jan 5, 2017Updated 9 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- A repository for learning various heap exploitation techniques.☆8,583Mar 26, 2026Updated 2 weeks ago
- ☆10Jun 13, 2014Updated 11 years ago
- A demo of altering an opened tab after a timer☆124Jun 11, 2016Updated 9 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago