JHUAPL / Beat-the-Machine
Reverse engineering basics in puzzle form
☆180Updated 4 years ago
Alternatives and similar repositories for Beat-the-Machine:
Users that are interested in Beat-the-Machine are comparing it to the libraries listed below
- ☆181Updated 5 years ago
- ☆32Updated 2 months ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆100Updated 4 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 4 years ago
- Reverse Engineering Resources☆226Updated 6 years ago
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 4 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆312Updated last year
- This repo is meant to be a list of companies that hire security people full remote.☆433Updated 4 months ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆20Updated 4 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆86Updated 2 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Slide decks from my conference presentations☆364Updated last year
- Cheat sheet of binary protections flags☆23Updated 4 years ago
- Damn Vulnerable IoT Device☆192Updated 11 months ago
- ☆227Updated last year
- Binary Golf Grand Prix☆111Updated last year
- PageBuster - dump all executable pages of packed processes.☆201Updated 3 years ago
- An ongoing list of virtual cybersecurity conferences.☆116Updated 3 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆142Updated 5 years ago
- esoteric☆51Updated 4 years ago
- ☆13Updated 2 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- Understanding and analyzing carrier files workshop repo☆48Updated 5 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆207Updated last year
- SSD Challenges☆47Updated 2 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- Course materials for hackaday.io Ghidra training☆384Updated last year