Slides from our technical talks
☆29Feb 5, 2026Updated last month
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- Solution descriptions for all the problems on foreverCTF☆11Aug 12, 2024Updated last year
- [ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation☆21Mar 26, 2025Updated 11 months ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)☆13Jul 30, 2021Updated 4 years ago
- IDA Patcher is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's ability to patch binary files and memory.☆25May 29, 2022Updated 3 years ago
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- Any code for preparing for OSCE☆12Oct 31, 2017Updated 8 years ago
- Discord webhook plugin for CTFd☆42Aug 4, 2024Updated last year
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- Binary Ninja Call Graph plugin☆24Apr 20, 2022Updated 3 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- ☆13Jul 11, 2024Updated last year
- Integer overflow in IOHIDDevice/IOUSBHIDDevice☆20Jun 3, 2016Updated 9 years ago
- Create a python deep learning chatbot to respond to Page Facebook Messenger☆10Apr 24, 2021Updated 4 years ago
- A tool for reversing IOKit classes from the iOS 12's new kernelcache format.☆23Aug 2, 2018Updated 7 years ago
- An approximate solver for concolic execution☆22Apr 29, 2025Updated 10 months ago
- Simple tool to dump/hide services in services.exe process.☆14Apr 22, 2022Updated 3 years ago
- Source files and writeups for UTCTF 2020☆37Mar 20, 2020Updated 6 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- ☆21Nov 3, 2018Updated 7 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆161Feb 18, 2026Updated last month
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- a new class of file structure attacks☆59Nov 19, 2022Updated 3 years ago
- SHELLCTF 2021 WriteUps. A beginner-friendly CTF with an objective to get the enthusiastic students familiar with the basics, along with a…☆12Jun 7, 2021Updated 4 years ago
- MCP for reverse engineering☆47Mar 30, 2025Updated 11 months ago
- ☆80Feb 26, 2025Updated last year
- ☆11Sep 7, 2023Updated 2 years ago
- Example of how you can create your own dojo☆12Sep 2, 2025Updated 6 months ago
- Store my 'Useful Commands' for HTB/OSCP and additional notes from my Obisidan. Merge into Obsidian for direct formatting. Also check out …☆16Aug 16, 2023Updated 2 years ago
- Cryptographic services library☆42Oct 8, 2018Updated 7 years ago
- MS17-010_CVE-2017-0143☆38Jun 5, 2025Updated 9 months ago
- ☆22Jul 27, 2020Updated 5 years ago
- ALBERT Persian Playground☆13Jun 12, 2023Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- RootersCTF 2019 challenges☆18Oct 12, 2019Updated 6 years ago