ssd-secure-disclosure / challengesLinks
SSD Challenges
☆48Updated 3 years ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆72Updated 4 years ago
- ☆21Updated 4 years ago
- Where CTFs happen☆82Updated last year
- esoteric☆56Updated 5 years ago
- Cheat sheet of binary protections flags☆24Updated 5 years ago
- ☆49Updated 5 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆61Updated 5 years ago
- tools for shellcoding☆59Updated 2 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆65Updated 2 years ago
- ☆13Updated 5 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆182Updated 6 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated 3 months ago
- ☆64Updated last year
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- ☆79Updated last year
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 8 months ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆71Updated 4 years ago
- ☆18Updated 5 years ago
- An automated setup for fuzzing Redis w/ AFL++☆34Updated 3 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- FLUFFI (Fully Localized Utility For Fuzzing Instantaneously) - A distributed evolutionary binary fuzzer for pentesters☆101Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆22Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- ☆36Updated 4 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 8 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- Reverse engineering software using a full system simulator☆191Updated last week