tharina / 34c3ctfLinks
34C3 Junior CTF pwnables
☆117Updated 6 years ago
Alternatives and similar repositories for 34c3ctf
Users that are interested in 34c3ctf are comparing it to the libraries listed below
Sorting:
- Sectalks MEL0x14 CTF☆38Updated 7 years ago
- Personal repository for all ctf related stuffs☆67Updated 8 months ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- 35C3 Junior CTF pwnables☆149Updated 6 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- ☆98Updated 3 years ago
- ☆122Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- ☆89Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- ☆25Updated 9 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- ☆16Updated 6 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago