andrealan / Software-Security-LabLinks
☆10Updated 5 years ago
Alternatives and similar repositories for Software-Security-Lab
Users that are interested in Software-Security-Lab are comparing it to the libraries listed below
Sorting:
- A bunch of reverse engineering Binaries dedicated to practice.☆13Updated 2 months ago
- Notes and challenges from the HeapLAB course taught by Max Kamper.☆21Updated 4 years ago
- This repository contains code, manuals and notes I wrote pertaining to system programming on Linux☆11Updated 2 years ago
- Udemy – Linux Heap Exploitation☆48Updated 4 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆60Updated 3 years ago
- reverse engninering & pwn writeup☆26Updated 5 years ago
- Collection of pwn techniques☆29Updated 3 years ago
- FSOP Again☆27Updated 3 years ago
- Writeups for CTFs☆78Updated 2 months ago
- A tool for automating setup of kernel pwn challenges☆60Updated last week
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.☆89Updated last year
- archive of the released challenges from corCTF 2021☆25Updated 4 years ago
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- I will upload challenges I create for various ctf's or educational purposes here.☆24Updated 3 years ago
- esoteric☆54Updated 5 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆65Updated 5 months ago
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago
- Binary Golf Grand Prix☆71Updated last week
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆121Updated 4 months ago
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- 'Ike: A binary exploitation and reversing handbook.☆86Updated 2 months ago
- A de-socketing library for fuzzing.☆160Updated 3 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆55Updated last year
- Kernel development & exploitation practice environment.☆239Updated 2 years ago
- My write-ups from various CTFs☆117Updated last year
- RE / Binary Exploitation Resources☆72Updated 7 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆97Updated 2 months ago
- Software Reverse Engineering with Ghidra, published by Packt☆162Updated 2 years ago
- A tool to search for gadgets, operations, and ROP chains using a backtracking algorithm in a tree-like structure☆19Updated 2 years ago