Reverse engineering basics in puzzle form
☆183May 20, 2020Updated 5 years ago
Alternatives and similar repositories for Beat-the-Machine
Users that are interested in Beat-the-Machine are comparing it to the libraries listed below
Sorting:
- Slide decks from my conference presentations☆367Sep 30, 2023Updated 2 years ago
- A repository where I share my injection implemintations☆29Jul 26, 2020Updated 5 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- ☆48Jul 7, 2020Updated 5 years ago
- This Is Indian Country - Spring 2018 Instance☆12Apr 30, 2018Updated 7 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Python 3 server used to control SK8RAT implant☆36Jan 5, 2021Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Jun 23, 2016Updated 9 years ago
- ☆86Oct 29, 2023Updated 2 years ago
- Slides from my conference presentations.☆80Aug 5, 2020Updated 5 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- #INFILTRATE20 raptor's party pack.☆30Nov 10, 2025Updated 3 months ago
- ☆30Dec 4, 2018Updated 7 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆127Jun 18, 2020Updated 5 years ago
- Android App Reverse Engineering Workshop☆1,525Apr 10, 2024Updated last year
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- ☆21Sep 25, 2023Updated 2 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- ELF packer for i386☆32Dec 14, 2015Updated 10 years ago
- ☆38Jan 6, 2025Updated last year
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆720Oct 19, 2024Updated last year
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆950Nov 26, 2022Updated 3 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- ☆49Dec 19, 2020Updated 5 years ago
- A proof of concept project that demonstrates oWASP.org's top 10 web vulnerabilities☆21Jun 22, 2015Updated 10 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago