verd1c / ctf-writeups
Reverse Engineering CTF Writeups
☆25Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ctf-writeups
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- A full English version of the popular ctf-wiki☆80Updated 4 months ago
- ☆67Updated 6 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆48Updated last year
- ☆157Updated 2 years ago
- Write-ups for various CTF☆178Updated 8 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- Source code of the challenges developed for the 2024 edition of openECSC☆62Updated last month
- Automatic tool to quickly start a pwn CTF challenge☆38Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆98Updated 10 months ago
- My write-ups from various CTFs☆114Updated 10 months ago
- My notes on pwn☆261Updated 2 months ago
- Writeups for the challenges from DownUnderCTF 2021☆173Updated 2 years ago
- Writeups for various CTF challenges☆24Updated 4 years ago
- ☆14Updated last month
- CTFs and solutions for Linux binary exploitation.☆108Updated 5 months ago
- Set of pre-generated pwn.college challenges☆60Updated last year
- Reverse Engineering challenges☆26Updated 3 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆173Updated 4 months ago
- Very simple script(s) to hasten binary exploit creation☆91Updated 3 years ago
- Docker image for attacking cryptography CTF challenges☆98Updated 6 months ago
- knowledge is power☆205Updated 7 months ago
- A tool for automating setup of kernel pwn challenges☆49Updated this week
- Python library for CTFer☆130Updated last week
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆16Updated 2 years ago
- ASLR bypass without infoleak☆152Updated 3 years ago
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆55Updated 2 years ago
- Kernel development & exploitation practice environment.☆212Updated last year
- ☆206Updated last year