BostonCybernetics-Training / GhidraAutomationsLinks
Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)
☆21Updated 2 years ago
Alternatives and similar repositories for GhidraAutomations
Users that are interested in GhidraAutomations are comparing it to the libraries listed below
Sorting:
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated this week
- Leveraging patch diffing to discover new vulnerabilities☆127Updated 9 months ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆77Updated last week
- ☆51Updated 6 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆87Updated 4 months ago
- ☆37Updated 7 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆107Updated last month
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆120Updated 3 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- ☆23Updated 6 months ago
- ☆28Updated 6 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 7 months ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 5 months ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆55Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆31Updated 2 years ago
- ☆84Updated 7 years ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- ☆47Updated 9 months ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated last month
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆46Updated 3 months ago
- ☆63Updated last year
- Lena's scripts/code/resources for malware analysis☆27Updated last year