0xdidu / Reverse-Engineering-Intel-x64-101Links
Material for a RE 101 class on Intel x64 binaries
☆164Updated 6 years ago
Alternatives and similar repositories for Reverse-Engineering-Intel-x64-101
Users that are interested in Reverse-Engineering-Intel-x64-101 are comparing it to the libraries listed below
Sorting:
- ☆182Updated 5 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆160Updated 5 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Updated 3 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- r2con2019 - slides and materials☆137Updated 5 years ago
- Vulnerability examples.☆412Updated last year
- collection of verified Linux kernel exploits☆191Updated 5 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆170Updated 6 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 7 months ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆295Updated 5 months ago
- A port of Kaitai to the Hiew hex editor☆149Updated 5 years ago
- GDB + GEF cheatsheet for reversing binaries☆74Updated 2 years ago
- A binary analysis framework☆133Updated 5 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- Fork of mona.py with x64dbg support☆109Updated 3 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆217Updated 7 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆424Updated 3 years ago
- List of real-world threats against endpoint protection software☆216Updated last month
- DarkNight theme for Ghidra☆129Updated 5 years ago
- INFILTRATE 2019 Demo Materials☆342Updated 2 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆101Updated 3 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆71Updated 4 years ago
- A network proxy library written in C# for .NET Core based on CANAPE☆188Updated 2 years ago
- IDAPython script to check ELF & PE/COFF for MS SDL banned.h policy violations and set breakpoints.☆36Updated last year
- Exploit Development, Reverse Engineering & Cryptography☆255Updated 4 months ago
- Reverse engineering challenges☆52Updated 6 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 7 years ago