JHUAPL / Beat-the-Machine
Reverse engineering basics in puzzle form
☆184Updated 4 years ago
Alternatives and similar repositories for Beat-the-Machine:
Users that are interested in Beat-the-Machine are comparing it to the libraries listed below
- ☆32Updated 6 months ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- Slide decks from my conference presentations☆363Updated last year
- ☆182Updated 5 years ago
- Reverse Engineering Resources☆223Updated 6 years ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆103Updated 4 years ago
- ☆305Updated last week
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 3 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- My solutions to the 2020 NSA Codebreaker Challenge☆75Updated 3 years ago
- Binary Golf Grand Prix☆111Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆690Updated 6 months ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- This repo is meant to be a list of companies that hire security people full remote.☆437Updated 2 weeks ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 2 years ago
- Course materials for hackaday.io Ghidra training☆393Updated last year
- esoteric☆52Updated 4 years ago
- OSEE Preparation☆175Updated 6 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- ☆229Updated last year
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆213Updated last year
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Exploitation and Mitigation Slides☆128Updated 10 months ago
- A multi-tenant network sandbox for security challenges☆79Updated 4 months ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆293Updated 3 months ago