compilepeace / BINARY_DISSECTION_COURSELinks
This repository is a hands-on tutorial which aims at going through dissection and analysis of arbitrary binaries.
☆56Updated 4 years ago
Alternatives and similar repositories for BINARY_DISSECTION_COURSE
Users that are interested in BINARY_DISSECTION_COURSE are comparing it to the libraries listed below
Sorting:
- Cheat sheet of binary protections flags☆25Updated 5 years ago
- ☆645Updated 7 months ago
- 'Ike: A binary exploitation and reversing handbook.☆87Updated 2 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆122Updated 4 months ago
- ☆113Updated last year
- ☆82Updated 8 years ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- Workshop on firmware reverse engineering☆346Updated last month
- Extra goodies for GEF to (try to) make GDB suck even less☆172Updated 8 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆166Updated last year
- ASLR bypass without infoleak☆163Updated 4 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆94Updated 2 years ago
- A list of open source reverse engineering tools with a focus on binary analysis☆228Updated last year
- A custom ELF linker/loader for installing ET_REL binary patches at runtime☆176Updated this week
- Binary Golf Grand Prix☆74Updated 3 weeks ago
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- A comprehensive Hypervisor resources repo☆180Updated 3 weeks ago
- Learning FreeBSD Kernel Hacking - Exercises☆43Updated 5 years ago
- A tool for firmware cartography☆161Updated 5 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆65Updated last year
- All Files, Scripts, and exploits can be found here☆68Updated 4 years ago
- Research notes☆129Updated 11 months ago
- ☆19Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆137Updated 3 months ago
- Binary Golf Library☆61Updated 4 years ago
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆160Updated 3 years ago
- Ghidra scripts for malware analysis☆102Updated last year
- ☆54Updated 6 years ago
- A set of vulnerable C code snippets (with mapped CVEs)☆78Updated last year
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆49Updated 3 years ago