solomonbstoner / solomonbston3r-ctf-diary
The diary of a n00b in the unfamiliar and terrifying venture into Capture-the-flag.
☆12Updated 6 years ago
Alternatives and similar repositories for solomonbston3r-ctf-diary
Users that are interested in solomonbston3r-ctf-diary are comparing it to the libraries listed below
Sorting:
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 7 years ago
- ☆88Updated 6 years ago
- GlibC Malloc for Exploiters presentation☆147Updated 5 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆51Updated 8 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic☆87Updated 3 years ago
- Library for creating CTF services.☆74Updated 8 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Writeups for Problems from PicoCTF 2014☆21Updated 10 years ago
- Code and exercises for a workshop on z3 and angr☆227Updated 4 years ago
- Practical CTF Hacking book, created by and for this class.☆52Updated 10 years ago
- Exploitation and Mitigation Slides☆128Updated 11 months ago
- Tutorial for writing kernel exploits☆252Updated 7 years ago
- Some stuffs for CODE BLUE 2016☆23Updated 8 years ago
- Manage building and deploying exploitation challenges with ease☆58Updated 2 weeks ago
- ☆26Updated 8 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆141Updated 6 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 8 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 2 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 5 years ago
- Cream of the Crop Pwning Challenges☆32Updated 5 years ago
- ☆16Updated 6 years ago
- ☆26Updated 7 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 9 months ago
- ☆109Updated 5 years ago