Tasteless CTF 2019
☆20Nov 6, 2019Updated 6 years ago
Alternatives and similar repositories for ctf2019
Users that are interested in ctf2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14May 26, 2022Updated 3 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- Automated CAN Analyzer☆15Dec 3, 2019Updated 6 years ago
- ☆26Feb 24, 2022Updated 4 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- ESP32 ROM blob to ELF convertor☆22May 9, 2018Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆16Aug 10, 2018Updated 7 years ago
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆195Aug 1, 2022Updated 3 years ago
- Make ARM Shellcode Great Again☆62Apr 8, 2021Updated 4 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- RFID controller for the Sonos music player☆15Jul 16, 2019Updated 6 years ago
- Kernel-based debugger for Linux applications☆75Mar 8, 2022Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆16May 9, 2016Updated 9 years ago
- iot安全题目学习记录☆17Dec 13, 2021Updated 4 years ago
- an advanced level shifting neighbor☆11Dec 6, 2021Updated 4 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- Writeups of CTF challenges☆32Sep 30, 2020Updated 5 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 5 months ago