AlyaGomaa / bitsbehumbleLinks
A lightweight type converter python library.
☆13Updated 5 years ago
Alternatives and similar repositories for bitsbehumble
Users that are interested in bitsbehumble are comparing it to the libraries listed below
Sorting:
- ☆12Updated 5 years ago
- Writeups for the challenges i wrote for ASCWG quals☆10Updated 3 years ago
- Revers3c-Team CTF writeups☆22Updated 6 years ago
- Reverse Engineering Resources☆230Updated 7 years ago
- Intro To CTF In Arabic☆17Updated 5 years ago
- ☆10Updated 5 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,156Updated 5 years ago
- A collection of pwn/CTF related utilities for Ghidra☆702Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆824Updated 2 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆528Updated 4 years ago
- An archive of low-level CTF challenges developed over the years☆649Updated 4 years ago
- Scripts for the Ghidra software reverse engineering suite.☆1,124Updated 5 years ago
- Analysis Reports of Malwares☆14Updated 6 years ago
- steganography project for rowdy hacks 2019 hackathon☆20Updated 3 years ago
- A Course on Intermediate Level Linux Exploitation☆1,006Updated 5 years ago
- Writeups for the ACI Cyberstakes CTF 2018☆23Updated 6 years ago
- Vulnerability examples.☆412Updated last year
- Free IDA Pro Binary Auditing Training Material for University Lectures - from http://binary-auditing.com . Contains decrypted/unzipped fi…☆187Updated 2 years ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆368Updated 8 months ago
- Infosec blog☆142Updated 3 years ago
- ☆17Updated 9 months ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆552Updated 2 months ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 5 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- ☆13Updated last year
- CTF Reversing Challenges List☆289Updated 6 years ago
- Binee: binary emulation environment☆528Updated 2 years ago
- ☆351Updated 10 years ago
- Some security related notes☆461Updated 8 years ago
- ☆14Updated 5 years ago