ssd-secure-disclosure / challengesLinks
SSD Challenges
☆48Updated 3 years ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆71Updated 4 years ago
- ☆13Updated 5 years ago
- ☆36Updated 4 years ago
- ☆21Updated 4 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆65Updated 2 years ago
- ☆49Updated 5 years ago
- esoteric☆56Updated 5 years ago
- ☆18Updated 5 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆61Updated 5 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- The Dumb Network Fuzzer☆20Updated 2 years ago
- Where CTFs happen☆82Updated last year
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- ☆182Updated 5 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- tools for shellcoding☆58Updated 2 years ago
- Cheat sheet of binary protections flags☆24Updated 5 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 7 months ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- ☆79Updated last year
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- A Pwning Toolkit☆27Updated last year
- ☆86Updated 2 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 10 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆126Updated last month
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 8 years ago