adamaviv / si485h-f18Links
SI485H: Stack Based Binary Exploits (United States Naval Academy) -- public version
☆22Updated 6 years ago
Alternatives and similar repositories for si485h-f18
Users that are interested in si485h-f18 are comparing it to the libraries listed below
Sorting:
- Collection of things made during my preparation to take on OSEE☆98Updated 5 years ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Scripts I used during CTP☆67Updated 4 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- esoteric☆54Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 4 years ago
- Fork of mona.py with x64dbg support☆103Updated 3 years ago
- OSEE Preparation☆179Updated 6 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- ☆83Updated 7 years ago
- ☆182Updated 5 years ago
- https://exploit.courses/☆19Updated 7 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆68Updated 4 years ago
- ☆36Updated 6 years ago
- In service of posteriority☆45Updated 3 years ago
- ☆20Updated 3 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆146Updated 5 years ago
- Git repo for challenges of encryptCTF 2019☆24Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆29Updated 5 years ago
- ☆49Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- SSD Challenges☆47Updated 2 years ago
- ☆24Updated 9 years ago
- Challenge Repository for CSAW CTF Quals 2019☆56Updated 2 years ago
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆48Updated last month
- ☆47Updated 8 years ago