utisss / talks
Slides from our technical talks
☆29Updated 5 months ago
Alternatives and similar repositories for talks:
Users that are interested in talks are comparing it to the libraries listed below
- Set of pre-generated pwn.college challenges☆65Updated 2 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- ☆45Updated last year
- All Files, Scripts, and exploits can be found here☆61Updated 3 years ago
- ☆27Updated 2 years ago
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆42Updated last year
- Repo for storing CTF related stuff (Writeups, etc.)☆51Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- Source files and writeups for UTCTF 2020☆36Updated 5 years ago
- Collection of browser challenges☆130Updated 3 years ago
- archive of the released challenges from corCTF 2021☆22Updated 3 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆67Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆184Updated last year
- 'Ike: A binary exploitation and reversing handbook.☆74Updated 2 months ago
- A collection of curated resources and CVEs I use for research.☆105Updated 3 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago
- tools for shellcoding☆55Updated last year
- Old and new CTFs about Linux kernel exploitation.☆53Updated 3 years ago
- A tool for finding the one gadget RCE in libc☆75Updated 4 years ago
- Source code for the 2022 DEF CON Finals.☆51Updated 2 years ago
- ☆161Updated 2 years ago
- Stereotyped Challenges (2014~2023)☆84Updated 2 years ago
- Cross-architecture instruction counting for CTF solving☆46Updated 3 years ago
- A tool for automating setup of kernel pwn challenges☆55Updated 4 months ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- In service of posteriority☆45Updated 2 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆30Updated 4 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆98Updated last month