angea / pocorgtfoLinks
a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.
☆1,515Updated last year
Alternatives and similar repositories for pocorgtfo
Users that are interested in pocorgtfo are comparing it to the libraries listed below
Sorting:
- documentations, slides decks...☆820Updated last year
- Proof of Concepts (PE, PDF...)☆1,530Updated 11 months ago
- Hash collisions and exploitations☆3,303Updated 9 months ago
- ☆650Updated 8 months ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,248Updated 11 months ago
- A collection of resources for linux reverse engineering☆2,061Updated 3 years ago
- ☆2,873Updated last year
- The Official Radare2 Book☆862Updated last week
- Some CrackMe codes for Linux x86/x86_64☆389Updated 2 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆731Updated 5 years ago
- SkySafe Miscellaneous Reverse Engineering Blog☆769Updated last year
- A sorted and updated list of security wargame sites.☆1,117Updated last month
- Course materials for hackaday.io Ghidra training☆415Updated last year
- Reverse Engineering using Radare2☆334Updated 3 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,069Updated 9 months ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,642Updated last year
- Recognize cpu instructions in an arbitrary binary file☆720Updated last year
- A series of tutorials about radare2 framework from https://www.megabeets.net☆528Updated 4 years ago
- Tutorials for getting started with Pwntools☆1,527Updated last year
- Some helpful preload libraries for pwning stuff.☆1,636Updated 6 months ago
- ☆351Updated 10 years ago
- An archive of low-level CTF challenges developed over the years☆647Updated 4 years ago
- Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work …☆286Updated 8 years ago
- Challenges for Binary Exploitation Workshop☆626Updated 3 years ago
- Some stuff about Hardware Hacking☆610Updated last year
- File formats☆968Updated 2 years ago
- A Bluetooth low energy capture the flag☆731Updated 3 months ago
- ☆1,505Updated 3 years ago
- A list of Reverse Engineering articles, books, and papers☆2,595Updated 2 years ago
- Hardware backdoors in some x86 CPUs☆2,378Updated 7 years ago