whatsyourask / basics-of-pwnLinks
My course work about basic binary exploitation.🤿
☆7Updated 3 years ago
Alternatives and similar repositories for basics-of-pwn
Users that are interested in basics-of-pwn are comparing it to the libraries listed below
Sorting:
- CTF Writeups☆27Updated 11 months ago
- Gonna share my writeups and resources here☆67Updated 6 months ago
- ☆37Updated 2 years ago
- Official writeups for Hack The Boo CTF 2023☆44Updated 8 months ago
- Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆46Updated 2 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆9Updated 2 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 6 months ago
- Beetlebug is an open source insecure Android application with CTF challenges built for Android Penetration Testers and Bug Bounty hunters…☆111Updated last year
- Writeups for various CTFs competitions☆102Updated last year
- The First Open Source Bug Bounty Platform☆84Updated 2 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆102Updated 8 months ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- ☆32Updated 3 weeks ago
- ☆21Updated last year
- DCTF 2022 Challenge and infrastructure repository☆10Updated last year
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆99Updated 3 weeks ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 2 months ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- This repository contains writeups for various CTFs I've participated in (Including Hack The Box).☆152Updated last month
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆20Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hope☆151Updated 8 months ago
- Fast exfiltration of text using only CSS and Ligatures☆55Updated 3 months ago
- Templates for submissions☆80Updated 2 weeks ago
- Practice Labs☆95Updated 4 years ago
- Transition form local file inclusion attacks to remote code exection☆64Updated 4 years ago
- Challenges I wrote for various CTF competitions☆44Updated last year
- The Android Penetration Testing Steps repository is intended for security professionals, penetration testers, developers, and anyone who …☆125Updated 2 years ago
- ☆23Updated 3 years ago
- Writeups for CTF challenges.☆77Updated last year