solomonbstoner / solomonbston3r-ctf-diaryLinks
The diary of a n00b in the unfamiliar and terrifying venture into Capture-the-flag.
☆12Updated 7 years ago
Alternatives and similar repositories for solomonbston3r-ctf-diary
Users that are interested in solomonbston3r-ctf-diary are comparing it to the libraries listed below
Sorting:
- Tutorial for writing kernel exploits☆256Updated 5 months ago
- ☆89Updated 7 years ago
- Rhme2 challenge (2016)☆330Updated 8 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆523Updated last year
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 8 years ago
- Useful tips by OTA CTF members☆149Updated 6 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- INFILTRATE 2019 Demo Materials☆342Updated 2 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆398Updated 3 years ago
- ☆111Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆234Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆237Updated 10 months ago
- Using Intel's PIN tool to solve CTF problems☆508Updated 5 years ago
- Reversing list☆150Updated 2 years ago
- GlibC Malloc for Exploiters presentation☆152Updated 6 years ago
- Riscure Hack Me embedded hardware CTF 2017-2018.☆88Updated 7 years ago
- ☆280Updated 5 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Linux Heap Exploitation Practice☆395Updated 7 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 7 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 6 years ago
- Library for creating CTF services.☆75Updated 9 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆389Updated 3 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Updated 6 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆276Updated 5 years ago
- CSAW Embedded Security Challenge 2019☆37Updated 6 years ago
- Setup for a pwning VM☆62Updated 7 years ago
- Some security related notes☆461Updated 8 years ago
- Challenge repo from TAMUctf 2019☆47Updated 6 years ago