sroettger / 35c3ctf_chals
☆14Updated 5 years ago
Alternatives and similar repositories for 35c3ctf_chals:
Users that are interested in 35c3ctf_chals are comparing it to the libraries listed below
- Cisco RV110w UPnP stack overflow☆27Updated 3 years ago
- ☆26Updated 2 years ago
- ☆30Updated 2 months ago
- An introduction course to system exploitation based on pwnable.kr challenges☆21Updated 2 weeks ago
- A Pwning Toolkit☆28Updated last month
- Collection of slides☆33Updated 10 months ago
- Our team's CTF writeups☆10Updated 5 years ago
- ☆25Updated last year
- Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six fixed Window DOS Vulnerabilities.☆14Updated 4 years ago
- ☆76Updated last week
- Simple WebSocket fuzzer☆32Updated last year
- A repository for my conference presentations☆35Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- CTF writeups☆30Updated 2 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆48Updated 7 months ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆21Updated 3 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Updated 2 years ago
- ☆24Updated 9 months ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27Updated 4 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month
- Proof-of-Concept of exploits that may be published☆20Updated 4 months ago
- My CTF writeups☆25Updated 3 years ago
- ☆70Updated last year
- Very Simple Fuzzer☆20Updated 4 years ago
- An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).☆48Updated 4 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 11 months ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 years ago