ssd-secure-disclosure / challengesLinks
SSD Challenges
☆47Updated 2 years ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- esoteric☆55Updated 4 years ago
- ☆20Updated 3 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆59Updated 5 years ago
- Where CTFs happen☆82Updated last year
- ☆49Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 4 years ago
- ☆13Updated 5 years ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- ☆182Updated 5 years ago
- A Pwning Toolkit☆28Updated 7 months ago
- ☆84Updated 7 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆55Updated 3 years ago
- The Dumb Network Fuzzer☆21Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 8 months ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆117Updated 9 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- ☆18Updated 5 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Upcoming list of ctfs directly in your terminal!☆16Updated 2 years ago
- In service of posteriority☆45Updated last month
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 7 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 3 months ago
- Reverse engineering software using a full system simulator☆183Updated this week
- qiling framework examples☆16Updated 3 years ago