ssd-secure-disclosure / challengesLinks
SSD Challenges
☆47Updated 2 years ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- ☆49Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- esoteric☆55Updated 4 years ago
- ☆20Updated 3 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆58Updated 5 years ago
- ☆18Updated 5 years ago
- Where CTFs happen☆81Updated last year
- ☆37Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- ☆182Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Some presentations I did in the past☆65Updated 2 years ago
- A library for patching ELFs☆57Updated 4 years ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Write-ups for crackmes and CTF challenges☆52Updated 2 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆55Updated 3 years ago
- Short writeups/solvers for interesting CTF challenges.☆17Updated 2 years ago
- ☆84Updated 7 years ago
- ☆13Updated 5 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- ☆77Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 7 months ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- qiling framework examples☆16Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆127Updated 9 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- Pwn2Win 2020 Challenges☆55Updated 4 years ago