ReversingID / Binary-SamplesLinks
Open repository of binary sample collections for binary analysis.
☆17Updated 4 years ago
Alternatives and similar repositories for Binary-Samples
Users that are interested in Binary-Samples are comparing it to the libraries listed below
Sorting:
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- Code snippets for Qiling Tutorials☆21Updated 4 years ago
- ☆48Updated 5 years ago
- A gentle introduction to binary exploitation☆41Updated 5 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36Updated 5 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- ☆85Updated last year
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Updated 4 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆49Updated 4 years ago
- Modern Binary Exploitation write-ups.☆4Updated 5 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- ☆49Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- Flare-On solutions☆36Updated 5 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Updated 5 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- Rekall Memory Forensic Framework☆32Updated 6 years ago
- Linux kernel internals' notes☆19Updated last year
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆70Updated 5 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆74Updated 6 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- A fast execution trace symbolizer for Windows.☆131Updated last year