shombo / cyberstakes-writeps-2018Links
Writeups for the ACI Cyberstakes CTF 2018
☆23Updated 6 years ago
Alternatives and similar repositories for cyberstakes-writeps-2018
Users that are interested in cyberstakes-writeps-2018 are comparing it to the libraries listed below
Sorting:
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- ☆182Updated 5 years ago
- Scapy hands-on at #GreHack17☆16Updated 8 years ago
- A multi-tenant network sandbox for security challenges☆85Updated last year
- Reverse engineering challenges☆52Updated 6 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆36Updated last year
- Fork of mona.py with x64dbg support☆108Updated 3 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆22Updated 5 years ago
- Notes, Slides, Comments and Commands on How to Win CCDC☆138Updated 8 months ago
- ☆23Updated 9 years ago
- Lewis & Clark CCDC Team Resources☆16Updated 10 years ago
- repository of tools & resources of the MMD team☆137Updated 3 years ago
- ☆351Updated 10 years ago
- Vulnerability examples.☆412Updated last year
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆23Updated 7 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- a pstree mod that prints other helpful information and with added functionality☆25Updated 5 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 7 years ago
- CTFs, solutions and presentations☆295Updated last month
- Orc is a post-exploitation framework for Linux written in Bash☆399Updated 6 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- OSEE Preparation☆191Updated 6 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆182Updated 10 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 7 years ago
- ☆54Updated 5 years ago
- Manage building and deploying exploitation challenges with ease☆59Updated last month
- A malware analysis and classification tool.☆190Updated 4 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆235Updated 9 months ago
- Exploitation and Mitigation Slides☆133Updated last year