GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.
-
Updated
Aug 4, 2022 - Python
GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.
These are CTF writeups (Pwn & Reverse Engineering)
A Collection of Writeups for Binary Exploitation CTF Problems
ROF - Raw Overflow Forge 🔥 An all-in-one ROP exploitation engine that automates binary analysis, gadget extraction, and payload generation. Perfect for CTF challenges, security research, and learning return-oriented programming techniques.
This repo contains scripts & documentation for buffer overflow exploit development and windows executable(Vulnserver).
Write-up on TryHackMe Side quest 2 (SQ2) - Advent of cyber 2025
Cybersecurity - Binary Exploitation
Cybersecurity - Binary Exploitation
Binary Exploitation Challenges Solving and a lot of Binaries Exploitation Challenge i came across through out time
Return-oriented programming (ROP)
Write up of solutions to the picoCTF 2023 capture the flag (CTF) event from my submissions during the competition.
Cyberchallenge CTF write ups
I will upload any writeups that I complete for rop emporium
Solutions and write-up for 2025 PicoCTF competition
CTF writeups covering challenges in Cryptography, Forensics, Programming, Binary Exploitation, Reverse Engineering, and Web Exploitation
Tips & Tricks on Binary Exploitation & Reverse Engineering
Add a description, image, and links to the binaryexploitation topic page so that developers can more easily learn about it.
To associate your repository with the binaryexploitation topic, visit your repo's landing page and select "manage topics."