Write ups of solution for CTF challenges I solved
☆25Jul 20, 2021Updated 4 years ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below
Sorting:
- ☆14Jun 25, 2019Updated 6 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- ☆15May 23, 2019Updated 6 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- CTF write-ups / solution scripts☆23Nov 4, 2018Updated 7 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- Messing Apple devices on the network with CVE-2018-4407 (heap overflow in bad packet handling)☆25Dec 4, 2018Updated 7 years ago
- ☆25Mar 18, 2018Updated 7 years ago
- Some tee/trustzone helper stuff☆55Sep 29, 2019Updated 6 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 10 months ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- linux-exploit☆14Jun 12, 2019Updated 6 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- 打造一台翻墙路由器,ShadowSocks翻墙,OpenWrt路由器☆11Jan 17, 2016Updated 10 years ago
- My personal website.☆12Feb 24, 2023Updated 3 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 6 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- upstream for seccheck☆15Jun 11, 2018Updated 7 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- ☆34Jan 1, 2019Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- various CTF writeups☆61Jun 28, 2018Updated 7 years ago
- Some python scripts are used to export userdata from huge idb(ida's database),ida 7.0 support only☆21Oct 18, 2018Updated 7 years ago
- Official Dexcalibur documentation☆17May 27, 2021Updated 4 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Jul 16, 2020Updated 5 years ago
- PoC for leaking text nodes via CSS injection☆35Aug 20, 2018Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago