Vergissmeinnicht's repositories
booksource
《第一行代码 第2版》全书源代码
Crypton
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
De1CTF2019
De1CTF2019
DIGITAL_SIGNATURES_NIST-PQC_BENCHMARKS
Benchmarks of the NIST's Post Quantum Crypto Contest of Digital Signatures in Process of Standardization(CRYSTALS-DILITHIUM, FALCON, GeMSS, LUOV, MQDSS, PICNIC, qTESLA, RAINBOW, SPHINCS+)
how2heap
A repository for learning various heap exploitation techniques.
IoRingReadWritePrimitive
Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2
LCTF2018
Source code, writeups and exps in LCTF2018.
libc-database
Build a database of libc offsets to simplify exploitation
LibcSearcher
glibc offset search for ctf.
Micro8
Gitbook
mt_rand-reverse
Script to recover mt_rand()'s seed with only two outputs and without any bruteforce.
pwn_deploy_chroot
可以方便地部署一个或者多个pwn题到一个docker容器中(使用chroot,并可以设置是否使用我自己写的catflag程序替换默认的/bin/sh程序,以增加安全性)
python3-pwntools
CTF framework and exploit development library in python3 (pwntools and binjitsu fork)
SCUTmaterial
华南你工大学软件学院历年考试资料。
wooyun_articles
drops.wooyun.org 乌云Drops文章备份