Tasteless CTF 2019
☆20Nov 6, 2019Updated 6 years ago
Alternatives and similar repositories for ctf2019
Users that are interested in ctf2019 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14May 26, 2022Updated 3 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Mimojas Firmware Toolkit for unpacking and analysis firmware images☆14May 23, 2020Updated 5 years ago
- ☆12Sep 23, 2021Updated 4 years ago
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Implicit White-box Implementations of ARX Ciphers☆16Nov 16, 2022Updated 3 years ago
- Automated CAN Analyzer☆15Dec 3, 2019Updated 6 years ago
- ☆26Feb 24, 2022Updated 4 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆20Dec 13, 2019Updated 6 years ago
- ESP32 ROM blob to ELF convertor☆22May 9, 2018Updated 7 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- GIAnT, the Generic Implementation ANalysis Toolkit☆12Jul 4, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 8 years ago
- Import an x64dbg database into a Ghidra Project☆22Aug 22, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Basis Reduction Algorithms for Codes (LLL and more)☆28Feb 27, 2024Updated 2 years ago
- ☆76Sep 30, 2021Updated 4 years ago
- Make ARM Shellcode Great Again☆62Apr 8, 2021Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Aug 1, 2022Updated 3 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- RFID controller for the Sonos music player☆15Jul 16, 2019Updated 6 years ago
- Kernel-based debugger for Linux applications☆75Mar 8, 2022Updated 4 years ago
- My solutions for CTF challenges☆74Dec 16, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆16May 9, 2016Updated 9 years ago
- iot安全题目学习记录☆17Dec 13, 2021Updated 4 years ago
- an advanced level shifting neighbor☆11Dec 6, 2021Updated 4 years ago
- Exploit Exercises for Security Researchers (arm, x86...)☆13May 10, 2019Updated 6 years ago
- exploitation of php use-after-free vulnerabilities on 64 bit systems | poc||gtfo☆12Apr 8, 2015Updated 11 years ago
- Writeups of CTF challenges☆32Sep 30, 2020Updated 5 years ago
- Fast defcon 26 quals pow solver☆24May 14, 2018Updated 7 years ago