Tasteless CTF 2019
☆20Nov 6, 2019Updated 6 years ago
Alternatives and similar repositories for ctf2019
Users that are interested in ctf2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14May 26, 2022Updated 3 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- ☆12Sep 23, 2021Updated 4 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- Automated CAN Analyzer☆15Dec 3, 2019Updated 6 years ago
- ☆26Feb 24, 2022Updated 4 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- ESP32 ROM blob to ELF convertor☆22May 9, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16Aug 10, 2018Updated 7 years ago
- Import an x64dbg database into a Ghidra Project☆22Aug 22, 2019Updated 6 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- Make ARM Shellcode Great Again☆62Apr 8, 2021Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Aug 1, 2022Updated 3 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- Kernel-based debugger for Linux applications☆75Mar 8, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- My solutions for CTF challenges☆74Dec 16, 2025Updated 4 months ago
- ☆16May 9, 2016Updated 9 years ago
- iot安全题目学习记录☆17Dec 13, 2021Updated 4 years ago
- an advanced level shifting neighbor☆11Dec 6, 2021Updated 4 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 11 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago