tharina / 35c3ctf
35C3 Junior CTF pwnables
☆148Updated 6 years ago
Alternatives and similar repositories for 35c3ctf:
Users that are interested in 35c3ctf are comparing it to the libraries listed below
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- CTF writeups☆112Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- 34C3 Junior CTF pwnables☆117Updated 6 years ago
- ☆90Updated 6 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆157Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated 2 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 5 years ago
- Source code and exploits for some 35c3ctf challenges.☆139Updated 6 years ago
- Personal repository for all ctf related stuffs☆67Updated 6 months ago
- A tool for checking exploitability☆209Updated 5 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Collection of scripts and writeups☆321Updated 3 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 7 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- Some kernel exploits☆144Updated 7 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Repo for CSAW CTF 2016 Quals challenges☆74Updated 8 years ago
- ☆89Updated 8 months ago
- A repository of challenges from various CTF competitions.☆156Updated 11 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆90Updated 6 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Automate repetitive tasks for fuzzing☆125Updated 3 years ago
- ☆122Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 6 months ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 4 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆141Updated 6 years ago