PacktPublishing / Ghidra-Software-Reverse-Engineering-for-Beginners---Second-EditionLinks
Ghidra Software Reverse Engineering for Beginners - Second Edition, published by Packt
☆42Updated last year
Alternatives and similar repositories for Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition
Users that are interested in Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition are comparing it to the libraries listed below
Sorting:
- Workshop on firmware reverse engineering☆355Updated 3 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆111Updated 2 months ago
- A collection of malware families and malware samples which use the Rust programming language.☆204Updated last week
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆125Updated 6 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆66Updated 2 months ago
- ☆72Updated 11 months ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆80Updated last year
- ☆122Updated 3 weeks ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆71Updated last year
- The most complete code auditing platform with thousands of real-world challenges☆135Updated 7 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆53Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆76Updated 5 months ago
- companion to our book of the same name, ISBN: 9781394199884☆161Updated last year
- Research notes☆131Updated last year
- This is practice VM for malware development☆175Updated 2 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 5 months ago
- Collection of codes focused on Linux rootkits☆192Updated 3 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- 🧞♂️ malware analysis☆38Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated 3 weeks ago
- Get information about stripped rust executables☆42Updated 8 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆133Updated 5 months ago
- ☆39Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 3 months ago
- ☆21Updated last year
- Python tool to resolve all strings in Go binaries obfuscated by garble☆182Updated 11 months ago
- ☆56Updated last year