34C3 Junior CTF pwnables
☆118Oct 30, 2018Updated 7 years ago
Alternatives and similar repositories for 34c3ctf
Users that are interested in 34c3ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 35C3 Junior CTF pwnables☆149Dec 30, 2018Updated 7 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆115Jan 5, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 8 years ago
- ☆27Apr 6, 2018Updated 7 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆942Nov 15, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- run AFL with pintool☆67Feb 24, 2020Updated 6 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 8 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆343Nov 24, 2018Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆305Jan 12, 2023Updated 3 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- ☆14Jul 9, 2018Updated 7 years ago
- PoC☆212Jan 13, 2025Updated last year
- ☆63Apr 13, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- Radare 2 wiki☆94Apr 24, 2020Updated 5 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Jan 30, 2021Updated 5 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- ☆22Jun 23, 2016Updated 9 years ago