PacktPublishing / Binary-Analysis-CookbookLinks
Binary Analysis Cookbook, published by Packt
☆42Updated 2 years ago
Alternatives and similar repositories for Binary-Analysis-Cookbook
Users that are interested in Binary-Analysis-Cookbook are comparing it to the libraries listed below
Sorting:
- My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago
- Mastering Malware Analysis, published by Packt☆39Updated 2 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆51Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- ☆66Updated 6 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- API Tracker by Cysinfo Team☆22Updated 8 years ago
- Advanced Malware Analysis [video], published by Packt☆21Updated 2 years ago
- A collection of Volatility Framework plugins.☆27Updated 11 years ago
- I'll post my custom shellcode I make here!☆22Updated 5 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- Firmware analysis website + API☆43Updated 4 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 11 years ago
- Penetration Testing with Shellcode, published by Packt☆36Updated 2 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 3 years ago
- Another Repo of Malware. Enjoy. <3☆59Updated 6 years ago
- I have taken all of the challenges from Protostar - https://exploit-exercises.com/protostar/- and compiled them for the ARM architecture.…☆25Updated 10 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 6 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Updated 4 years ago
- Binary reversing tool to find all possible code paths between two functions.☆27Updated 7 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 8 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- ☆21Updated 6 years ago