☆12Aug 22, 2022Updated 3 years ago
Alternatives and similar repositories for fsop-finder
Users that are interested in fsop-finder are comparing it to the libraries listed below
Sorting:
- a new class of file structure attacks☆59Nov 19, 2022Updated 3 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- Challenges for ImaginaryCTF 2023☆14Jul 29, 2023Updated 2 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- All challenges and writups of the GlacierCTF 2023☆16Feb 15, 2024Updated 2 years ago
- ☆23Jan 27, 2026Updated last month
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Feb 12, 2025Updated last year
- For V8CTF M123☆17Aug 25, 2024Updated last year
- CTF PWN解题赛中,PWN题流量监控系统,可快速排查攻击来源、攻击过程,迅速定位可疑相似流量。☆15Nov 27, 2022Updated 3 years ago
- Templates for deploying pwn challenge in ctf☆52Mar 24, 2023Updated 2 years ago
- ☆44Nov 28, 2021Updated 4 years ago
- Our CTF Write-Up / solve scripts☆22Aug 21, 2023Updated 2 years ago
- ctf patching toy☆49Nov 18, 2024Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- ☆49Dec 4, 2023Updated 2 years ago
- a GDB plug-in for inspecting mallocng☆60Aug 10, 2024Updated last year
- ☆34Apr 14, 2025Updated 10 months ago
- ☆34Jun 11, 2024Updated last year
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- ☆39Jul 25, 2025Updated 7 months ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- My solutions for CTF challenges☆75Dec 16, 2025Updated 2 months ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆39Jul 13, 2023Updated 2 years ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- headless-ida-mcp-server☆33Apr 4, 2025Updated 11 months ago
- ☆228Dec 9, 2020Updated 5 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Apr 11, 2023Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆41Aug 9, 2023Updated 2 years ago
- Archive of AAA CTF 2023 (XCTF competition)☆37Nov 27, 2023Updated 2 years ago
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆42Jun 6, 2023Updated 2 years ago
- Do pwn by command line☆420Apr 27, 2025Updated 10 months ago
- ☆30Nov 25, 2025Updated 3 months ago
- Android webviews and securiy☆23Sep 18, 2025Updated 5 months ago
- ☆14Jul 1, 2025Updated 8 months ago
- ☆12Jan 28, 2026Updated last month
- Build a database of libc offsets and ld.so files to simplify exploitation☆13Sep 13, 2018Updated 7 years ago
- My personal dot files☆10Sep 13, 2022Updated 3 years ago