shombo / cyberstakes-writeps-2018Links
Writeups for the ACI Cyberstakes CTF 2018
☆23Updated 6 years ago
Alternatives and similar repositories for cyberstakes-writeps-2018
Users that are interested in cyberstakes-writeps-2018 are comparing it to the libraries listed below
Sorting:
- Manage building and deploying exploitation challenges with ease☆58Updated last month
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated last year
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- ☆17Updated 5 years ago
- ☆24Updated 9 years ago
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- ☆107Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆51Updated 8 years ago
- ☆21Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 7 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆21Updated 4 years ago
- ☆88Updated 7 years ago
- POLAR☆73Updated 6 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Updated 10 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆80Updated 9 months ago
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago
- Collection of things made during my preparation to take on OSEE☆98Updated 5 years ago
- All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs☆19Updated 5 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- SEC599 supporting GitHub repository☆16Updated 5 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆137Updated 2 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago
- Page File analysis tools.☆127Updated 9 years ago
- Honeybag helps you to create 'bait archive' with any folders and files, notify you if someone accesses it☆16Updated 4 years ago
- ☆182Updated 5 years ago
- Lazy Office Analyzer☆122Updated 8 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆99Updated 5 years ago