Write ups of solution for CTF challenges I solved
☆25Jul 20, 2021Updated 4 years ago
Alternatives and similar repositories for ctf-writeups
Users that are interested in ctf-writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆47Dec 29, 2018Updated 7 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- ☆15May 23, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A small utility to grep for pointers & binary data in memory dumps / live process memory☆24Jul 16, 2018Updated 7 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- CTF write-ups / solution scripts☆23Nov 4, 2018Updated 7 years ago
- upstream for seccheck☆15Jun 11, 2018Updated 7 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- Some tee/trustzone helper stuff☆56Sep 29, 2019Updated 6 years ago
- ☆25Mar 18, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 5 years ago
- ☆68Apr 13, 2020Updated 6 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- PoC for leaking text nodes via CSS injection☆35Aug 20, 2018Updated 7 years ago
- My CTF tasks and writeup☆38Dec 6, 2022Updated 3 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆30Dec 4, 2018Updated 7 years ago
- various CTF writeups☆61Jun 28, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Retro Game Engine inspired by the SNES-era☆25Sep 15, 2022Updated 3 years ago
- My personal website.☆12Feb 24, 2023Updated 3 years ago
- 35C3 Slides☆23Dec 29, 2018Updated 7 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 6 months ago
- Hardcore corruption of my execve() vulnerability in WSL☆216Feb 2, 2018Updated 8 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 8 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Tools and Materials for the Frida Engage Blog Series☆45Mar 28, 2018Updated 8 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆227Jul 2, 2025Updated 9 months ago
- Challenge attachments for RWCTF 3rd.☆91Jul 1, 2021Updated 4 years ago