Es7evam / Security-StudiesLinks
Some guides about general topics on information security
☆13Updated 6 years ago
Alternatives and similar repositories for Security-Studies
Users that are interested in Security-Studies are comparing it to the libraries listed below
Sorting:
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Updated 5 years ago
- FinSpy for Android technical analysis and tools☆55Updated 4 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆20Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- tools for shellcoding☆56Updated 2 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36Updated 5 years ago
- RingZer0 Writeup.☆30Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆142Updated 3 years ago
- Reverse engineering challenges☆52Updated 5 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆59Updated 5 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆74Updated 6 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- https://exploit.courses/☆19Updated 7 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆62Updated 2 years ago
- ☆36Updated 4 years ago
- [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).☆121Updated 4 years ago
- Stego Helper Identification Tool☆27Updated 6 years ago
- ☆25Updated this week
- ☆13Updated 5 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 6 months ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- ☆26Updated 3 years ago
- From IoT Pentesting to IoT Security☆22Updated 6 years ago
- Android security workshop material taught during the CyberTruck Challenge 2019 (Detroit USA).☆103Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Android Hacking Event 2017 Write-up☆46Updated 8 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆88Updated 3 years ago