ReversingID / Binary-SamplesLinks
Open repository of binary sample collections for binary analysis.
☆17Updated 4 years ago
Alternatives and similar repositories for Binary-Samples
Users that are interested in Binary-Samples are comparing it to the libraries listed below
Sorting:
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the hel…☆17Updated 3 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36Updated 5 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- ☆50Updated 5 years ago
- ☆18Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆22Updated 6 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆96Updated 4 months ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 6 months ago
- Collection of ezine about virii☆17Updated 3 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- scripting IDA like a Pro☆24Updated 4 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- ☆86Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆72Updated 4 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆39Updated 3 years ago
- Fix Go obfuscated binaries that were obfuscated using gobfuscator☆47Updated 4 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆74Updated 6 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆14Updated 4 years ago
- Example files to experience basic exploit techniques.☆74Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Updated 5 years ago