35C3 Junior CTF pwnables
☆149Dec 30, 2018Updated 7 years ago
Alternatives and similar repositories for 35c3ctf
Users that are interested in 35c3ctf are comparing it to the libraries listed below
Sorting:
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Nov 24, 2018Updated 7 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- 34C3 Junior CTF pwnables☆118Oct 30, 2018Updated 7 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- An archive of low-level CTF challenges developed over the years☆653Nov 28, 2021Updated 4 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Exploits and advisories☆207Dec 29, 2025Updated 2 months ago
- ☆37Jun 7, 2019Updated 6 years ago
- Collection of (at time of release) iOS bugs I found☆56Jan 28, 2020Updated 6 years ago
- ☆463Oct 4, 2020Updated 5 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆115Jan 5, 2018Updated 8 years ago
- ☆100Aug 28, 2018Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- A DBI tool to discover heap memory related bugs☆125Jun 25, 2018Updated 7 years ago
- Slides from my conference presentations.☆80Aug 5, 2020Updated 5 years ago
- This repo contains Writeups for the 35C3CTF.☆48Jan 4, 2019Updated 7 years ago
- PoC for CVE-2018-15133 (Laravel unserialize vulnerability)☆260Mar 10, 2024Updated last year
- PoC☆212Jan 13, 2025Updated last year
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆228Dec 28, 2019Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Sep 4, 2018Updated 7 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Mar 22, 2017Updated 8 years ago
- ☆68Mar 15, 2024Updated last year
- Fuzzing Browsers☆316Dec 5, 2022Updated 3 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- powerd exploit : Sandbox escape to root for Apple iOS < 12.2 on A11 devices☆110Mar 28, 2019Updated 6 years ago