angea / pocorgtfo
a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.
☆1,352Updated 11 months ago
Alternatives and similar repositories for pocorgtfo:
Users that are interested in pocorgtfo are comparing it to the libraries listed below
- documentations, slides decks...☆785Updated 8 months ago
- Proof of Concepts (PE, PDF...)☆1,488Updated 3 weeks ago
- Hash collisions and exploitations☆3,128Updated 9 months ago
- A simple guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS....☆947Updated 5 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆766Updated 2 months ago
- ☆552Updated 4 months ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,834Updated 3 weeks ago
- ☆1,491Updated 2 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,337Updated 5 months ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,899Updated 2 months ago
- Diaphora, the most advanced Free and Open Source program diffing tool.☆3,715Updated last month
- Brainfuck interpreter inside printf☆649Updated 3 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆715Updated 4 years ago
- Scripts for the Ghidra software reverse engineering suite.☆1,046Updated 4 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆521Updated 4 years ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,256Updated 2 weeks ago
- Some helpful preload libraries for pwning stuff.☆1,583Updated this week
- ☆343Updated 9 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,415Updated 9 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,327Updated 3 years ago
- The x86 processor fuzzer☆494Updated 6 years ago
- Hardware backdoors in some x86 CPUs☆2,347Updated 6 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,534Updated last week
- A curated list of awesome Ghidra materials☆1,203Updated 3 years ago
- Reverse engineering framework in Python☆3,529Updated 5 months ago
- A list of Reverse Engineering articles, books, and papers☆2,397Updated last year
- The 'exploitable' GDB plugin☆715Updated 2 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,106Updated 4 years ago
- Repository for information about 0-days exploited in-the-wild.☆770Updated 2 months ago
- UNIX-like reverse engineering framework and command-line toolset.☆2,774Updated this week