bysideen / eBook-1
☆59Updated 5 years ago
Alternatives and similar repositories for eBook-1:
Users that are interested in eBook-1 are comparing it to the libraries listed below
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆96Updated 2 years ago
- Reverse Engineering challenges☆32Updated 4 years ago
- Solutions to some crackmes that I have done.☆65Updated 2 years ago
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆38Updated last year
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆31Updated last year
- ☆49Updated 6 years ago
- How to write a CrackMe for a CTF competition. Source code, technical explanation, anti-debugging and anti reverse-engineering tricks.☆47Updated 2 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆83Updated last year
- 「🧊」Ring 3 Rootkit for Windows 10☆59Updated 3 months ago
- x86 Trampoline Hook☆40Updated 2 years ago
- ☆64Updated 3 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆43Updated last year
- windows rootkit☆58Updated 11 months ago
- A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.☆26Updated 4 months ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆74Updated 7 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆17Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆220Updated last year
- Malware analysis tools used alongside "Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software" Book by Andrew Ho…☆40Updated 6 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆44Updated 4 years ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆37Updated 3 weeks ago
- Nuevo Curso Completo de Exploiting con IDA Pro pro Ricardo Narvaja☆101Updated 6 years ago
- An aimbot for Assault Cube 1.2.0.2 that automatically aims at enemy players.☆16Updated 3 years ago
- Detect API Hooks☆73Updated 2 years ago
- user-mode Rootkit☆104Updated 2 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆27Updated 2 years ago
- How to setup Pycharm to run scripts in IDA using the Run menu (or a keybind)☆42Updated 10 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- ASLR bypass without infoleak☆160Updated 3 years ago
- Collection of Win32 with C++/Assembly for Hooking, Patch and Reversing PE file☆12Updated 2 years ago