Writeups of challenges from pwnable.kr
-
Updated
May 7, 2022 - Python
Writeups of challenges from pwnable.kr
write-ups from CTFs and HTB walkthroughs
The Perfect Hack! - IEEE NITK Edify Workshop
A mock (awful) ctf built to practice binary exploitation
Writeups for PicoCTF challenges
New Horizonz - A blog about Offensive Security Adventures
Over Ride is a CTF like challenge about exploiting ELF32 & ELF64 binaries on x86_64 architecture
Hayden Housen's solutions to the 2021 PicoCTF Competition
Write up of solutions to the UofTCTF 2024 capture the flag (CTF) event from my submissions during the competition.
Challenge for the practical course binary exploitation at TUM in WS 23/24.
Linux Binary Exploitation 二进制程式开发入门 (基于linux环境)
I will upload any writeups that I complete for rop emporium
CVE-2019-18655 metasploit module. SEH based buffer overflow in file sharing wizard app v.1.5.0.
Job interview preparation
Some writeups for pwnable.kr challenges
Basic binary exploitation | Working of Malwares/Binaries | Obfuscation to avoid antivirus | Parser Differential to avoid analysis of Binary/Malwares
This repo includes exploits from beginner to advance level that I designed while learning.
Exploitable VM for learning about buffer overflow attacks
Add a description, image, and links to the binary-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the binary-exploitation topic, visit your repo's landing page and select "manage topics."