IshHamachshev / AssemblerLinks
Assembler in C for a project in university
☆8Updated last year
Alternatives and similar repositories for Assembler
Users that are interested in Assembler are comparing it to the libraries listed below
Sorting:
- Activate Windows & Office 🔑☆12Updated last year
- lowlevel cyber course - riscv & i8086 competition☆11Updated 6 years ago
- A research paper about the internals of memory management and heap exploitation☆25Updated 2 years ago
- 🚩 framework for kernel memory exploitation (WIP)☆15Updated 4 months ago
- Kernel PWN Tooklkit aimed mainly for CTF players☆16Updated 11 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆118Updated last year
- A Python library to debug binary executables, your own way.☆236Updated this week
- Collection of pwn techniques☆29Updated 3 years ago
- ☆12Updated last year
- Write dynamic binary analysis tools in Python☆118Updated last month
- A virtualization-based endpoint security solution for Windows☆86Updated 4 years ago
- Writeups of some Reverse Engineering challenges in CTFs I played☆33Updated 3 years ago
- A tool for automating setup of kernel pwn challenges☆59Updated last month
- ☆162Updated 6 months ago
- FSOP Again☆24Updated 3 years ago
- An intuitive query API for IDA Pro☆157Updated 3 months ago
- Writeups for CTFs☆73Updated 3 weeks ago
- A bunch of V8 resources (with a security focus)☆47Updated last week
- Some examples of anti debug techniques used in malware or commercial products preventing analysts to debug code of app.☆21Updated 5 years ago
- Let's get familiar with Windows pwn 😎☆46Updated 5 years ago
- An IDA Pro plugin that display cross-references to functions or variables across the entire binary in Hex-Rays pseudocode☆111Updated last month
- Linux & Android Kernel Vulnerability research and exploitation☆51Updated last year
- 🎵 Official source code and writeups for SekaiCTF 2024!☆79Updated 10 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago
- ☆100Updated last year
- RSA Coppersmith Stereotyped Message Recovery with Python 3 using Sage Math☆9Updated 3 years ago
- a new class of file structure attacks☆54Updated 2 years ago
- Reverse Engineering challenges☆34Updated 4 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆67Updated 2 weeks ago
- Hyper-V related resources☆31Updated last year