JeremyBlackthorne / RPISEC-CoursesLinks
☆182Updated 5 years ago
Alternatives and similar repositories for RPISEC-Courses
Users that are interested in RPISEC-Courses are comparing it to the libraries listed below
Sorting:
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- Reverse engineering challenges☆52Updated 5 years ago
- Free IDA Pro Binary Auditing Training Material for University Lectures - from http://binary-auditing.com . Contains decrypted/unzipped fi…☆175Updated 2 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- Exploitation and Mitigation Slides☆132Updated last year
- A thorough library database to assist with binary exploitation tasks.☆196Updated 3 years ago
- esoteric☆54Updated 5 years ago
- Guide to buffer overflows☆59Updated 4 years ago
- Fork of mona.py with x64dbg support☆108Updated 3 years ago
- Exploiting challenges in Linux and Windows☆119Updated 5 years ago
- r2con2019 - slides and materials☆137Updated 5 years ago
- Reverse Engineering Resources☆228Updated 7 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Updated 2 months ago
- Very simple script(s) to hasten binary exploit creation☆93Updated 4 years ago
- Vulnerability examples.☆410Updated last year
- SSD Challenges☆48Updated 3 years ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆160Updated 5 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆52Updated 8 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆106Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- Reversing list☆149Updated last year
- Useful tips by OTA CTF members☆147Updated 6 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Updated 7 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Frida Boot 👢- A binary instrumentation workshop, with Frida, for beginners!☆317Updated 2 years ago
- ☆20Updated 3 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago