☆113Oct 17, 2017Updated 8 years ago
Alternatives and similar repositories for ctf-crypto-writeups
Users that are interested in ctf-crypto-writeups are comparing it to the libraries listed below
Sorting:
- Useful crypto tools for CTF☆40Jul 2, 2022Updated 3 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- ctf writeups☆19Sep 4, 2018Updated 7 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Official repository containing files related to N1CTF 2018.☆223Apr 26, 2018Updated 7 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- a pwn demo for easy manage a pwn server☆25Aug 3, 2016Updated 9 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- SECCON 2018 Online CTF 27-28 Oct. 2018☆37Nov 4, 2018Updated 7 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- CTF write-ups by Plaid Parliament of Pwning☆806Jun 4, 2024Updated last year
- Simple hash-mining c library and its python binding.☆64Jun 28, 2019Updated 6 years ago
- Tutorial for writing kernel exploits☆256Aug 10, 2025Updated 6 months ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- ☆81Jun 12, 2017Updated 8 years ago
- ☆21Nov 7, 2016Updated 9 years ago
- CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux☆24Aug 10, 2025Updated 6 months ago
- A new technique to bypass microsoft's applocker.☆12May 27, 2015Updated 10 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆507May 11, 2021Updated 4 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Jul 27, 2016Updated 9 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- Sample Program for rust-uefi. It's running as a UEFI apps written by Rust.☆16Sep 14, 2019Updated 6 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- radare2 cLEMENCy plugins☆24Nov 5, 2017Updated 8 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago