PacktPublishing / Ghidra-Software-Reverse-Engineering-for-Beginners---Second-EditionLinks
Ghidra Software Reverse Engineering for Beginners - Second Edition, published by Packt
☆40Updated 11 months ago
Alternatives and similar repositories for Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition
Users that are interested in Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition are comparing it to the libraries listed below
Sorting:
- Workshop on firmware reverse engineering☆346Updated 2 months ago
- Binary Exploitation Phrack CTF Challenge☆138Updated 3 months ago
- The most complete code auditing platform with thousands of real-world challenges☆131Updated 5 months ago
- ☆54Updated last year
- Binary Golf Grand Prix☆75Updated last week
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆52Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆167Updated last year
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆80Updated last year
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆70Updated 11 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆61Updated 2 weeks ago
- A collection of malware families and malware samples which use the Rust programming language.☆185Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆122Updated 4 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 3 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆107Updated last week
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 3 months ago
- Get information about stripped rust executables☆37Updated 6 months ago
- Code snippets for Reverse engineering training for xtraining platform☆33Updated 2 years ago
- Write ups for Ph0wn CTF☆47Updated 3 months ago
- ASLR bypass without infoleak☆163Updated 4 years ago
- ☆71Updated 9 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆129Updated 3 months ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆50Updated last year
- ☆114Updated 2 weeks ago
- list of organizations offering vulnerability research/reverse engineering jobs☆101Updated 2 months ago
- This is practice VM for malware development☆145Updated last week
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆75Updated 3 months ago
- examples of using radius2 to solve reversing challenges☆36Updated 10 months ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆94Updated last month