JHUAPL / Beat-the-Machine
Reverse engineering basics in puzzle form
☆180Updated 4 years ago
Alternatives and similar repositories for Beat-the-Machine:
Users that are interested in Beat-the-Machine are comparing it to the libraries listed below
- ☆182Updated 5 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆101Updated 4 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 4 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- ☆32Updated 3 months ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- An ongoing list of virtual cybersecurity conferences.☆117Updated 3 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆312Updated last year
- Reverse Engineering Resources☆225Updated 6 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Slide decks from my conference presentations☆364Updated last year
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆142Updated 5 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆685Updated 4 months ago
- A workshop on Packet Crafting using Scapy.☆154Updated 4 years ago
- OSEE Preparation☆173Updated 6 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- My solutions to the 2020 NSA Codebreaker Challenge☆75Updated 3 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- ☆24Updated 8 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 4 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆770Updated 3 months ago
- Damn Vulnerable IoT Device☆197Updated last year
- List of Repositories☆96Updated 3 years ago
- DC540 hacking challenge 0x00001.☆26Updated last year