34C3 Junior CTF pwnables
☆118Oct 30, 2018Updated 7 years ago
Alternatives and similar repositories for 34c3ctf
Users that are interested in 34c3ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 35C3 Junior CTF pwnables☆149Dec 30, 2018Updated 7 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- r2con 2017 September 6-9☆97Oct 23, 2017Updated 8 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆115Jan 5, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- Tool to view heap chunks and memory writes (using pintool)☆43Dec 8, 2018Updated 7 years ago
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 8 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆73Dec 28, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆37Jan 8, 2017Updated 9 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 9 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- ☆27Apr 6, 2018Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of vulnerable ARM binaries for practicing exploit development☆947Nov 15, 2021Updated 4 years ago
- run AFL with pintool☆67Feb 24, 2020Updated 6 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 8 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆343Nov 24, 2018Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆307Jan 12, 2023Updated 3 years ago
- ☆14Jul 9, 2018Updated 7 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- PoC☆212Jan 13, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- ☆63Apr 13, 2017Updated 9 years ago
- Radare 2 wiki☆94Apr 24, 2020Updated 6 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Jan 30, 2021Updated 5 years ago
- Ghidra P-Code emulation and static LLVM lifting in Python☆38Mar 26, 2022Updated 4 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 9 years ago
- ☆19Mar 20, 2014Updated 12 years ago