vital-information-resource-under-siege / PWN-Challenges
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
☆21Updated last week
Alternatives and similar repositories for PWN-Challenges:
Users that are interested in PWN-Challenges are comparing it to the libraries listed below
- Materials from different CTFs for later reuse☆24Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- Gonna share my writeups and resources here☆62Updated last month
- RE / Binary Exploitation Resources☆67Updated 7 years ago
- ☆46Updated 6 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆12Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆56Updated last year
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆12Updated 2 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆12Updated 3 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆24Updated 3 years ago
- Random Exploits☆50Updated last year
- A reverse shell in PHP using Unicode encoding as variable assignment☆20Updated 3 years ago
- Slides and other material from various conference presentations.☆40Updated 3 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 8 months ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆14Updated 2 years ago
- Some CTF writeups written by meeeeeee☆8Updated 9 months ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆30Updated 5 years ago
- ☆32Updated this week
- OSED Practice binary☆24Updated last year
- Ansible build for Afl++ Frida-Mode☆23Updated 8 months ago
- CTF challenges WriteUp☆14Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- ☆26Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- 2022 CTF public release☆24Updated 2 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Updated 2 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- Challenge files☆11Updated 3 years ago