| trailofbits/ctf |
1,261 |
|
0 |
0 |
over 2 years ago |
0 |
|
17 |
cc-by-sa-4.0 |
C |
| CTF Field Guide |
| stong/how-to-exploit-a-double-free |
881 |
|
0 |
0 |
over 4 years ago |
0 |
|
1 |
|
Python |
| How to exploit a double free vulnerability in 2021. 'Use After Free for Dummies' |
| bkerler/exploit_me |
637 |
|
0 |
0 |
over 5 years ago |
0 |
|
1 |
mit |
C++ |
| Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques) |
| vngkv123/aSiagaming |
420 |
|
0 |
0 |
over 4 years ago |
0 |
|
2 |
|
JavaScript |
| My Chrome and Safari exploit code + write-up repo |
| vmayoral/robot_hacking_manual |
236 |
|
0 |
0 |
about 3 years ago |
0 |
|
1 |
apache-2.0 |
TeX |
| Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity. |
| ktecv2000/How-to-play-CTF |
128 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
|
|
| CTF入門建議 |
| biocore/gemelli |
60 |
|
0 |
0 |
about 2 years ago |
0 |
|
27 |
bsd-3-clause |
Python |
| Gemelli is a tool box for running Robust Aitchison PCA (RPCA), Joint Robust Aitchison PCA (Joint-RPCA), TEMPoral TEnsor Decomposition (TEMPTED), and Compositional Tensor Factorization (CTF) on sparse compositional omics datasets. |
| Hustcw/Angr_Tutorial_For_CTF |
47 |
|
0 |
0 |
about 5 years ago |
0 |
|
1 |
|
Python |
| angr tutorial for ctf |
| matrix1001/interactive-pwnning-tutorial |
33 |
|
0 |
0 |
over 6 years ago |
0 |
|
0 |
|
|
| 🍗An interactive way of pwnning. |
| thngkaiyuan/how-to-self-learn-infosec |
24 |
|
0 |
0 |
about 8 years ago |
0 |
|
0 |
|
|
| Ans to the FAQ: How do you self-learn information security? |