shombo / cyberstakes-writeps-2018
Writeups for the ACI Cyberstakes CTF 2018
☆23Updated 5 years ago
Alternatives and similar repositories for cyberstakes-writeps-2018:
Users that are interested in cyberstakes-writeps-2018 are comparing it to the libraries listed below
- SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version☆22Updated 6 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆157Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆35Updated last year
- ☆182Updated 5 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆72Updated 5 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 3 months ago
- Fork of mona.py with x64dbg support☆99Updated 2 years ago
- Exploitation and Mitigation Slides☆127Updated 8 months ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆142Updated 5 years ago
- ☆60Updated 7 months ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆132Updated 2 years ago
- All-Army CyberStakes 4 Challenge Write-ups and Walk-throughs☆18Updated 4 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- ☆24Updated 8 years ago
- ☆105Updated 5 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago
- esoteric☆51Updated 4 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆83Updated 4 years ago
- ☆17Updated 5 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- ☆231Updated 7 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆140Updated 3 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆52Updated 8 years ago