Es7evam / Security-Studies
Some guides about general topics on information security
☆13Updated 5 years ago
Alternatives and similar repositories for Security-Studies:
Users that are interested in Security-Studies are comparing it to the libraries listed below
- ☆24Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 4 years ago
- A gentle introduction to binary exploitation☆41Updated 4 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 3 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆19Updated 4 years ago
- Modern Binary Exploitation write-ups.☆4Updated 4 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- CTFs I've played so far☆17Updated 2 years ago
- ☆26Updated 3 years ago
- ☆20Updated 3 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆12Updated 3 years ago
- A Pwning Toolkit☆29Updated last week
- frida snippet generator firefox extension for developer.android.com☆23Updated 2 years ago
- A pwning environment, now on docker!☆18Updated 3 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆21Updated 3 years ago
- From IoT Pentesting to IoT Security☆22Updated 6 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- ☆26Updated 2 years ago
- Ctf Writeups☆10Updated 4 years ago
- Helper script to deal with offsets when doing work in debuggers.☆12Updated 5 years ago