some example ctf writeups
☆27Oct 23, 2020Updated 5 years ago
Alternatives and similar repositories for ctfs
Users that are interested in ctfs are comparing it to the libraries listed below
Sorting:
- My solution for GitHub Security Lab CTF 4: CodeQL and Chill - The Java Edition☆19Jun 10, 2020Updated 5 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- A reverse shell cheat-sheet tool☆39Mar 5, 2019Updated 6 years ago
- Windows privilege escalation workstation☆17Nov 22, 2015Updated 10 years ago
- MiniPwner's website and forums aren't exactly clear on what you need to do. I'm here to help!☆20Jan 15, 2016Updated 10 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Feb 14, 2020Updated 6 years ago
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Dec 16, 2017Updated 8 years ago
- Obtains the kernel task port and establishes a kernel function calling primitive on the iPhone XS, iPhone XR, and iPhone 8 running iOS 12…☆29Jan 29, 2019Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Get a clean, ready-to-go Linux box in seconds.☆25Mar 12, 2024Updated last year
- Internet Explorer MemoryProtection Mitigation☆32Jul 17, 2014Updated 11 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Todos los scripts y locuras del Blog SniferL4bs que sean desarrollados vendran en esta pequeña sección dedicada☆21Jun 22, 2024Updated last year
- The place where my HackSys Extreme Vulnerable Driver exploits go.☆25Oct 21, 2018Updated 7 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 10 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- ☆28Jun 28, 2019Updated 6 years ago
- Merge all Yara rules from official Yara github repository in one .yar file☆31Jun 22, 2018Updated 7 years ago
- ☆26May 7, 2018Updated 7 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- CTF Writeups☆190Oct 8, 2017Updated 8 years ago
- My CTF write-ups!☆27Dec 22, 2022Updated 3 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 6 years ago
- ☆119Mar 21, 2020Updated 5 years ago
- Malware sandbox evasion tricks and solution☆32Jul 5, 2017Updated 8 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- ☆33Oct 27, 2016Updated 9 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- fastjson-1.2.61-RCE☆33Sep 26, 2019Updated 6 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆91Feb 14, 2019Updated 7 years ago
- ☆35Nov 2, 2022Updated 3 years ago
- Challenges I created for 35c3☆48Dec 31, 2018Updated 7 years ago
- CVE Exploit PoC's☆34Sep 3, 2023Updated 2 years ago
- Synaptics Audio Driver LPE☆38Apr 15, 2019Updated 6 years ago
- CVE-2020-5837 exploit☆43May 13, 2020Updated 5 years ago
- A modified reGeorg for One-line PHP Shell.☆86Nov 18, 2018Updated 7 years ago