JHUAPL / Beat-the-MachineLinks
Reverse engineering basics in puzzle form
☆184Updated 5 years ago
Alternatives and similar repositories for Beat-the-Machine
Users that are interested in Beat-the-Machine are comparing it to the libraries listed below
Sorting:
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 4 years ago
- ☆182Updated 5 years ago
- ☆32Updated 7 months ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- Reverse Engineering Resources☆224Updated 6 years ago
- Slide decks from my conference presentations☆363Updated last year
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆218Updated last year
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- DC540 hacking challenge 0x00001.☆26Updated last year
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago
- Binary Golf Grand Prix☆111Updated last year
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- ☆77Updated last year
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆317Updated last year
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆21Updated 4 years ago
- An ongoing list of virtual cybersecurity conferences.☆120Updated 4 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- NSA Codebreaker Challenge 2021 Write-Ups☆56Updated 3 years ago
- esoteric☆54Updated 4 years ago
- Exploitation and Mitigation Slides☆128Updated last year
- List of the tools and usage☆234Updated 2 years ago
- SSD Challenges☆47Updated 2 years ago
- A multi-tenant network sandbox for security challenges☆79Updated 5 months ago