BostonCybernetics-Training / GhidraAutomations
Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)
☆18Updated last year
Alternatives and similar repositories for GhidraAutomations:
Users that are interested in GhidraAutomations are comparing it to the libraries listed below
- Leveraging patch diffing to discover new vulnerabilities☆109Updated 2 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆45Updated 2 weeks ago
- ☆45Updated 6 years ago
- Powershell Linter☆49Updated last month
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆107Updated 2 months ago
- ☆22Updated last month
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆27Updated 2 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 2 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 9 months ago
- A series of writes about “Binary Exploitation”.☆86Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆35Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆13Updated 2 years ago
- ☆33Updated last month
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 2 years ago
- ☆15Updated 3 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆51Updated 9 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- ☆15Updated 7 months ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 2 years ago
- ☆55Updated 3 months ago
- ☆77Updated last month
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆49Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 7 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆74Updated 2 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆79Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆52Updated 2 years ago
- Materials from different CTFs for later reuse☆23Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago