andrealan / Software-Security-LabLinks
☆10Updated 6 years ago
Alternatives and similar repositories for Software-Security-Lab
Users that are interested in Software-Security-Lab are comparing it to the libraries listed below
Sorting:
- A bunch of reverse engineering Binaries dedicated to practice.☆16Updated 5 months ago
- course materials and references for its450☆34Updated 3 years ago
- This repository contains code, manuals and notes I wrote pertaining to system programming on Linux☆11Updated 2 years ago
- Notes and challenges from the HeapLAB course taught by Max Kamper.☆21Updated 4 years ago
- Software Reverse Engineering with Ghidra, published by Packt☆164Updated 3 years ago
- Udemy – Linux Heap Exploitation☆54Updated 4 years ago
- A collection of my shellcode samples.☆21Updated 2 months ago
- ARM 32-bit Raspberry Pi Hacking Int example in Kali Linux.☆12Updated 2 months ago
- ☆95Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆72Updated 4 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆280Updated last week
- Binary Golf Grand Prix☆84Updated last month
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.☆91Updated 2 months ago
- ☆12Updated last year
- 'Ike: A binary exploitation and reversing handbook.☆89Updated 5 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- Collection of pwn techniques☆29Updated 3 years ago
- A (very) simple 32-bit RISCV processor with a loaded Pong game to show it off☆11Updated last year
- ☆54Updated 9 months ago
- Binary Golf Grand Prix☆116Updated 2 years ago
- Set of pre-generated pwn.college challenges☆68Updated 3 years ago
- RE / Binary Exploitation Resources☆72Updated 8 years ago
- Python Command-Line Ghidra Decompiler☆123Updated 3 weeks ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆62Updated 3 years ago
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Updated 6 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆125Updated 6 months ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 8 years ago
- Advanced memory management features of C and C++; the differences between imperative and object-oriented paradigms. The functional paradi…☆40Updated last year
- ☆10Updated 4 years ago
- This contains notes, slides, and code for my BsidesSeattle 2023 talk, Unmasking the Godfather☆11Updated 2 years ago