TobalJackson / 2017-SIT-RE-PresentationLinks
Intro to radare2 presentation files.
☆83Updated 7 years ago
Alternatives and similar repositories for 2017-SIT-RE-Presentation
Users that are interested in 2017-SIT-RE-Presentation are comparing it to the libraries listed below
Sorting:
- Radare2 cheat-sheet☆113Updated 7 years ago
- Reverse Engineering using Radare2☆333Updated 3 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- A portable reverse engineering environment using docker.☆212Updated 7 years ago
- ☆351Updated 10 years ago
- Guide to buffer overflows☆59Updated 4 years ago
- ☆182Updated 5 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 7 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆26Updated 9 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago
- GDB + GEF cheatsheet for reversing binaries☆74Updated 2 years ago
- Open and censorship resistant crackmes repository☆128Updated 5 years ago
- Radare Congress Stuff☆215Updated 3 weeks ago
- Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work …☆284Updated 8 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆53Updated 9 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 3 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆236Updated 8 months ago
- Supplement to radare2-explorations.☆34Updated 8 years ago
- Exploit Development and Reverse Engineering with GDB Made Easy☆38Updated 6 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆276Updated 5 years ago
- random brain dumps☆350Updated 8 years ago
- DarkNight theme for Ghidra☆127Updated 5 years ago
- Resources for the Pwn Adventure 3 challenges from GITS'15 (http://ghostintheshellcode.com/2015-final/)☆101Updated 3 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago