PacktPublishing / Ghidra-Software-Reverse-Engineering-for-Beginners
Software Reverse Engineering with Ghidra, published by Packt
☆149Updated 2 years ago
Alternatives and similar repositories for Ghidra-Software-Reverse-Engineering-for-Beginners:
Users that are interested in Ghidra-Software-Reverse-Engineering-for-Beginners are comparing it to the libraries listed below
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆251Updated 5 months ago
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆338Updated last year
- Reverse engineering software using a full system simulator☆181Updated this week
- esoteric☆52Updated 4 years ago
- ☆318Updated 10 months ago
- ☆191Updated 7 years ago
- ☆78Updated last year
- Exercise writeups from the book Practical Malware Analysis.☆206Updated last year
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆213Updated last year
- Stash for Binary Exploitation and Reverse Engineering Resources☆103Updated 4 years ago
- CTFs and solutions for Linux binary exploitation.☆108Updated 10 months ago
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆418Updated 2 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Udemy – Linux Heap Exploitation☆41Updated 3 years ago
- A list of resources for those interested in hardware, embedded, and IoT security☆65Updated 6 months ago
- 0xpat blog☆100Updated 3 years ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆620Updated last month
- ☆136Updated 3 years ago
- Use angr in Ghidra☆582Updated 8 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆316Updated last month
- A tool for firmware cartography☆147Updated 4 months ago
- ☆83Updated 7 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- ☆304Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- Slides & Hands-on for the reverse engineering workshop☆178Updated 2 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆88Updated 2 years ago
- 🐍 Solving CTF challenges using Z3 and Python☆60Updated last year
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago