ssd-secure-disclosure / challengesLinks
SSD Challenges
☆47Updated 2 years ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- esoteric☆54Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- ☆20Updated 3 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆58Updated 5 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆79Updated 2 years ago
- ☆13Updated 4 years ago
- ☆62Updated 11 months ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- ☆49Updated 4 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- ☆18Updated 5 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 6 months ago
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆48Updated 4 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Updated 8 months ago
- The Dumb Network Fuzzer☆20Updated last year
- ☆85Updated last year
- House of Gods Heap Exploitation Technique☆18Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- ☆62Updated 3 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆119Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year