Writeups of challenges from pwnable.kr
-
Updated
May 7, 2022 - Python
Writeups of challenges from pwnable.kr
Write up of solutions to the UofTCTF 2024 capture the flag (CTF) event from my submissions during the competition.
Cyber security introduction course
Basic binary exploitation | Working of Malwares/Binaries | Obfuscation to avoid antivirus | Parser Differential to avoid analysis of Binary/Malwares
Exploitable VM for learning about buffer overflow attacks
Writeup of Protostar box found on exploit.education
Perfect Blue's CTF Writeups
Payloads and Scripts for hacking/solving CTFs, included with vulnerability target description
ROPEmporium Solutions & Write-up
Writeup for my solutions to the challenges on ropemporium.com
This repository is dedicated to the vulnserver app exploitation. Each folder contain two files, the final exploit PoC.py and the fuzzing command file.
Programs and or walkthroughs relating to PicoCTF (https://picoctf.org/)
Solution of the task "leaky_pipe" from 0xL4ughCTF
This is a tool for creating a basic skeleton for binary exploitation
ISC
In this repository, I will be sharing my exploits and writeups for various CTF competitions that I have participated in.
Automation of buffer overflows corrupting the Saved Return Pointer.
Writeup for the Buffer Overflow Prep room on TryHackMe.
My Solutions To Win OverTheWire Challenges.
Add a description, image, and links to the binary-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the binary-exploitation topic, visit your repo's landing page and select "manage topics."