35C3 Junior CTF pwnables
☆149Dec 30, 2018Updated 7 years ago
Alternatives and similar repositories for 35c3ctf
Users that are interested in 35c3ctf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 34C3 Junior CTF pwnables☆118Oct 30, 2018Updated 7 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆343Nov 24, 2018Updated 7 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆115Jan 5, 2018Updated 8 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- An archive of low-level CTF challenges developed over the years☆653Nov 28, 2021Updated 4 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Challenges I created for 35c3☆48Dec 31, 2018Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- A DBI tool to discover heap memory related bugs☆125Jun 25, 2018Updated 7 years ago
- ☆17Sep 3, 2018Updated 7 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exploits and advisories☆207Dec 29, 2025Updated 2 months ago
- ☆463Oct 4, 2020Updated 5 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- PoC for CVE-2018-15133 (Laravel unserialize vulnerability)☆260Mar 10, 2024Updated 2 years ago
- Collection of (at time of release) iOS bugs I found☆56Jan 28, 2020Updated 6 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆228Dec 28, 2019Updated 6 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PoC☆212Jan 13, 2025Updated last year
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Fuzzing Browsers☆317Dec 5, 2022Updated 3 years ago
- Symbolic Execution Tool in r2☆106Jan 21, 2022Updated 4 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Automatically generate ASM.JS JIT-Spray payloads☆36Mar 14, 2018Updated 8 years ago
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago