shift-crops / CTFWriteups
my writeups (mainly pwnable)
☆33Updated 6 months ago
Alternatives and similar repositories for CTFWriteups:
Users that are interested in CTFWriteups are comparing it to the libraries listed below
- small cute utils for kernel challenges☆34Updated 11 months ago
- ☆29Updated 2 years ago
- Lazy python wrapper of KLEE for solving CTF challenges☆65Updated 4 years ago
- ☆73Updated last year
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆88Updated 6 years ago
- A python library to find one-gadget☆28Updated 6 years ago
- a new class of file structure attacks☆49Updated 2 years ago
- A tool for finding the one gadget RCE in libc☆75Updated 4 years ago
- ☆13Updated 3 years ago
- ☆153Updated 6 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆41Updated 2 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆51Updated last year
- qemu vulnerablity.☆50Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆78Updated 2 years ago
- A library for patching ELFs☆53Updated 4 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆82Updated 5 years ago
- HITCON CTF 2018☆45Updated 6 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- Docker Image for Pwn☆9Updated last year
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- ☆67Updated last year
- ☆26Updated 3 years ago
- My challenges for SECCON CTF 2022 Finals☆17Updated 2 years ago
- ☆53Updated 3 years ago
- ☆45Updated 3 years ago
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆41Updated last year
- Various debugging tools such as %DumpObjects for v8☆53Updated 6 years ago
- Old and new CTFs about Linux kernel exploitation.☆52Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆31Updated 4 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆150Updated 4 years ago