ReversingID / Binary-SamplesLinks
Open repository of binary sample collections for binary analysis.
☆17Updated 4 years ago
Alternatives and similar repositories for Binary-Samples
Users that are interested in Binary-Samples are comparing it to the libraries listed below
Sorting:
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆48Updated 5 years ago
- ☆49Updated 5 years ago
- ☆18Updated 5 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the hel…☆17Updated 3 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- Exploits I've authored☆60Updated 5 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 5 years ago
- Introductory software reverse engineering tutorial for beginners☆35Updated 6 years ago
- ☆11Updated 4 years ago
- A git history of Windows filesystems☆76Updated 4 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 3 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- Flare-On solutions☆36Updated 5 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- scripting IDA like a Pro☆24Updated 4 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 5 years ago
- ☆21Updated 4 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆29Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago