Andromeda1957 / Reversing-Challenges
Reverse engineering challenges
☆50Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Reversing-Challenges
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆58Updated 3 years ago
- Fork of mona.py with x64dbg support☆97Updated 2 years ago
- ☆181Updated 4 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- Write-ups for crackmes and CTF challenges☆49Updated last year
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆27Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆72Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 4 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- ☆20Updated 2 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆47Updated 5 years ago
- Slack bot for challenge management in large teams☆60Updated last year
- A novel technique to hide code from debuggers & disassemblers☆152Updated 3 months ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 2 months ago
- Setup for a pwning VM☆60Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 7 years ago
- ☆35Updated 6 years ago
- Exploitation and Mitigation Slides☆127Updated 5 months ago
- Generate very tiny reverse shell binaries for Linux~☆74Updated 4 years ago