JHUAPL / Beat-the-Machine
Reverse engineering basics in puzzle form
☆184Updated 4 years ago
Alternatives and similar repositories for Beat-the-Machine
Users that are interested in Beat-the-Machine are comparing it to the libraries listed below
Sorting:
- Stash for Binary Exploitation and Reverse Engineering Resources☆103Updated 4 years ago
- ☆32Updated 6 months ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- ☆182Updated 5 years ago
- Slide decks from my conference presentations☆363Updated last year
- A collection of writeups and solutions for the Cyber FastTrack Spring 2020 CTF☆60Updated 5 years ago
- Reverse Engineering Resources☆223Updated 6 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- DEF CON 27 (2019) OpenCTF Repository - Developed, Organized, and Hosted by Neg9☆21Updated 4 years ago
- Scripts and Writeups for the NSA Codebreaker Challenge 2019☆61Updated 3 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- ☆229Updated last year
- This repo is meant to be a list of companies that hire security people full remote.☆441Updated last month
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆107Updated 6 years ago
- Course materials for hackaday.io Ghidra training☆397Updated last year
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆148Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago
- Created a CTF challenge based on Beat Saber☆40Updated 5 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Binary Golf Grand Prix☆111Updated last year
- esoteric☆52Updated 4 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆775Updated 6 months ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- Interactive tutorial for radare.☆28Updated 4 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- An ongoing list of virtual cybersecurity conferences.☆120Updated 4 years ago
- CTF writeups from The Flat Network Society☆133Updated 4 months ago