PacktPublishing / Ghidra-Software-Reverse-Engineering-for-BeginnersLinks
Software Reverse Engineering with Ghidra, published by Packt
☆155Updated 2 years ago
Alternatives and similar repositories for Ghidra-Software-Reverse-Engineering-for-Beginners
Users that are interested in Ghidra-Software-Reverse-Engineering-for-Beginners are comparing it to the libraries listed below
Sorting:
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 4 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆259Updated 7 months ago
- 0xpat blog☆100Updated 3 years ago
- esoteric☆55Updated 4 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆344Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- Reverse engineering software using a full system simulator☆183Updated 2 weeks ago
- ☆84Updated 7 years ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- CTFs and solutions for Linux binary exploitation.☆110Updated last year
- Slides & Hands-on for the reverse engineering workshop☆180Updated 2 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆223Updated last year
- ☆206Updated 3 weeks ago
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆112Updated 2 years ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆130Updated last week
- Course materials for hackaday.io Ghidra training☆401Updated last year
- Comprehensive toolkit for Ghidra headless.☆356Updated 3 months ago
- ☆307Updated 3 years ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated 2 years ago
- A list of open source reverse engineering tools with a focus on binary analysis☆219Updated last year
- Exercise writeups from the book Practical Malware Analysis.☆226Updated last year
- The Firmware Security Testing Methodology (FSTM) is composed of nine stages tailored to enable security researchers, software developers,…☆423Updated 3 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆94Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- SSD Challenges☆47Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated last month
- A Binary Ninja plugin for vulnerability research.☆294Updated 10 months ago