Reverse engineering challenges
☆52Nov 3, 2019Updated 6 years ago
Alternatives and similar repositories for Reversing-Challenges
Users that are interested in Reversing-Challenges are comparing it to the libraries listed below
Sorting:
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆40Apr 16, 2018Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Sep 11, 2017Updated 8 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- All in one tool for ethical hacking and pen testing.☆13May 22, 2023Updated 2 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- ☆11Aug 9, 2016Updated 9 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Jan 18, 2018Updated 8 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Jun 14, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Awesome list for baseband modem resources.☆13Jun 20, 2018Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- ☆14May 19, 2019Updated 6 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago