PacktPublishing / Ghidra-Software-Reverse-Engineering-for-Beginners---Second-EditionLinks
Ghidra Software Reverse Engineering for Beginners - Second Edition, published by Packt
☆41Updated last year
Alternatives and similar repositories for Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition
Users that are interested in Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition are comparing it to the libraries listed below
Sorting:
- Workshop on firmware reverse engineering☆352Updated 3 months ago
- Code snippets for Reverse engineering training for xtraining platform☆33Updated 3 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆123Updated 5 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆65Updated last month
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- A collection of malware families and malware samples which use the Rust programming language.☆201Updated last week
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆80Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆131Updated 4 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆52Updated 2 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 4 months ago
- Binary Exploitation Phrack CTF Challenge☆139Updated 4 months ago
- ☆71Updated 10 months ago
- ☆117Updated 2 weeks ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆17Updated last year
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆71Updated last year
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, c…☆150Updated 4 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆74Updated 4 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆108Updated last month
- Research notes☆131Updated last year
- Malware Analysis Exercise Samples and Resources☆53Updated 3 weeks ago
- This is practice VM for malware development☆170Updated last month
- ☆39Updated last year
- Collection of codes focused on Linux rootkits☆188Updated 2 months ago
- Get information about stripped rust executables☆40Updated 7 months ago
- ☆55Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- This contains notes and slides for my talk on Reverse Engineering Android Malware☆58Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year