PacktPublishing / Ghidra-Software-Reverse-Engineering-for-Beginners---Second-EditionLinks
Ghidra Software Reverse Engineering for Beginners - Second Edition, published by Packt
☆42Updated 11 months ago
Alternatives and similar repositories for Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition
Users that are interested in Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition are comparing it to the libraries listed below
Sorting:
- Workshop on firmware reverse engineering☆350Updated 2 months ago
- Code snippets for Reverse engineering training for xtraining platform☆33Updated 3 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆65Updated last month
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆122Updated 5 months ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆51Updated last year
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆108Updated last month
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 4 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆52Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- ☆71Updated 10 months ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆70Updated 11 months ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆43Updated 2 years ago
- A collection of malware families and malware samples which use the Rust programming language.☆200Updated this week
- Malware Analysis Exercise Samples and Resources☆52Updated 3 weeks ago
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 5 months ago
- Research notes☆131Updated last year
- Binary Exploitation Phrack CTF Challenge☆139Updated 3 months ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆80Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 4 months ago
- ☆39Updated last year
- Get information about stripped rust executables☆39Updated 7 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 2 years ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆130Updated 4 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆76Updated 4 months ago
- ☆116Updated last week
- ☆55Updated last year
- This is practice VM for malware development☆169Updated last month
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- A curated list of resources for the OSED journey.☆71Updated 3 years ago