tastelessctf / ctf2019Links
Tasteless CTF 2019
☆20Updated 5 years ago
Alternatives and similar repositories for ctf2019
Users that are interested in ctf2019 are comparing it to the libraries listed below
Sorting:
- Qiling Advanced Binary Emulation framework☆23Updated 5 years ago
- View Linux perf traces in IDA Pro☆14Updated 5 years ago
- Abstract library to generate angr states from a debugger state☆60Updated 5 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 7 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Make ARM Shellcode Great Again☆62Updated 4 years ago
- Source code for building an exploitable linux kernel challenge iso.☆46Updated 11 years ago
- Automatic Vulnerability Discovery☆38Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- realtime cross-tool collaborative reverse engineering☆101Updated 2 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆39Updated 8 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Patches to afl to fix bugs or add enhancements☆81Updated 5 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- ☆49Updated 4 years ago
- ☆38Updated 4 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- Routines for hunting down kernel structs.☆41Updated 13 years ago
- ☆90Updated 6 years ago
- z3 scripts and ctf challenge solutions.☆24Updated 2 years ago