Kennyslaboratory / Reverse-Engineering-Cheatsheet
Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.
☆28Updated 4 years ago
Alternatives and similar repositories for Reverse-Engineering-Cheatsheet:
Users that are interested in Reverse-Engineering-Cheatsheet are comparing it to the libraries listed below
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆40Updated last year
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆96Updated last year
- ☆77Updated 3 years ago
- Gonna share my writeups and resources here☆60Updated this week
- Reverse Engineering and Malware Analysis Roadmap☆56Updated 5 months ago
- ☆65Updated 3 years ago
- The best resources for learning exploit development☆110Updated 5 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆28Updated 2 years ago
- Malware Analysis Tools☆29Updated 5 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆27Updated last year
- A composite list of various vulnerabilities and tools to look for and use while exploiting common CTF challenges☆46Updated last year
- Crappy Golang code to list local listening ports and their associated processes.☆30Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 11 months ago
- Writeups for the Hack The Box Cyber Apocalypse 2023 CTF contest☆31Updated last year
- Notes template for Offensive Security's EXP-301 course and OSED exam☆16Updated 2 years ago
- RE / Binary Exploitation Resources☆67Updated 7 years ago
- Practice Labs☆82Updated 4 years ago
- A curated list of resources for the OSED journey.☆58Updated 2 years ago
- A curated list of awesome malware analysis tools and resources☆53Updated 3 years ago
- A comprehensive Hypervisor resources repo☆101Updated this week
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆26Updated 4 months ago
- 🧞♂️ malware analysis☆30Updated 10 months ago
- CTF Beginners Guide!!☆57Updated 5 years ago
- A series of writes about “Binary Exploitation”.☆86Updated last year
- ☆31Updated 3 weeks ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆29Updated last year
- Just another collection of links, tools, reports and other stuff☆21Updated 3 years ago
- eLearnSecurity Certified Exploit Development☆100Updated 3 years ago
- Official writeups for Hack The Boo CTF 2023☆43Updated last month
- ☆36Updated 3 weeks ago