Imeneallouche / Binary-Exploitation-RoadmapLinks
This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigation
☆22Updated last year
Alternatives and similar repositories for Binary-Exploitation-Roadmap
Users that are interested in Binary-Exploitation-Roadmap are comparing it to the libraries listed below
Sorting:
- ☆255Updated 2 years ago
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆22Updated 2 years ago
- ctf writeups by the rounding error team ✏️☆35Updated 5 months ago
- how to get a few pwn points if you don't know how to pwn☆29Updated 6 years ago
- ☆53Updated last year
- ⚠️ malware development☆626Updated last year
- Reverse Engineering and Malware Analysis Roadmap☆494Updated last month
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- ☆53Updated 2 weeks ago
- Resources for learning about Exploit Development☆412Updated 5 years ago
- Repository for my GitBook (CTF writeups / vuln research / bugbounty)☆14Updated this week
- Official writeups for University CTF 2023: Brains & Bytes☆104Updated 11 months ago
- My notes on pwn☆289Updated 2 months ago
- Challenge handouts, source code, and solutions for UofTCTF 2025☆33Updated 10 months ago
- Writeups for various CTFs competitions☆104Updated 2 years ago
- ☆113Updated last year
- knowledge is power☆229Updated 3 months ago
- Official writeups for Cyber Apocalypse CTF 2025: Tales from Eldoria☆181Updated 7 months ago
- Official writeups for Cyber Apocalypse CTF 2024: Hacker Royale☆210Updated 11 months ago
- Useful scripts from past CTF challenges☆40Updated 2 months ago
- Pure Malware Development Resource Collections☆397Updated 10 months ago
- 🧞♂️ malware analysis☆37Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆364Updated 7 months ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆768Updated last year
- A research paper about the internals of memory management and heap exploitation☆27Updated 2 years ago
- Course materials for teaching cybersecurity in a Capture the Flag environment☆178Updated 4 years ago
- Reverse Engineering challenges☆36Updated 4 years ago
- Learn Binary Exploitation with sample problems and solutions☆167Updated 2 years ago
- ☆145Updated 8 months ago
- Common CTF Challenges is a collection of tools and resources to help individuals improve their Capture the Flag (CTF) skills. Cover a wid…☆126Updated last week