tharina / 35c3ctfLinks
35C3 Junior CTF pwnables
☆148Updated 6 years ago
Alternatives and similar repositories for 35c3ctf
Users that are interested in 35c3ctf are comparing it to the libraries listed below
Sorting:
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆157Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 8 years ago
- ☆190Updated 7 years ago
- X41 Browser Security White Paper - Tools and PoCs☆184Updated 8 years ago
- Some kernel exploits☆145Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆103Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆299Updated 2 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Updated 8 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Updated 6 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆142Updated 6 years ago
- CTF writeups☆113Updated 8 years ago
- Radare 2 wiki☆94Updated 5 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Updated 7 years ago
- This repo has been migrated to https://github.com/github/security-lab/tree/master/SecurityExploits☆251Updated 5 years ago
- 34C3 Junior CTF pwnables☆118Updated 6 years ago
- ☆91Updated 6 years ago
- ☆121Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 11 months ago
- Attacking the Core associated source files☆88Updated 7 years ago
- Exploiting challenges in Linux and Windows☆119Updated 5 years ago
- r2con2019 - slides and materials☆137Updated 5 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago