This repository is a hands-on tutorial which aims at going through dissection and analysis of arbitrary binaries.
☆56Jan 21, 2021Updated 5 years ago
Alternatives and similar repositories for BINARY_DISSECTION_COURSE
Users that are interested in BINARY_DISSECTION_COURSE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains code, manuals and notes I wrote pertaining to system programming on Linux☆12Jun 8, 2023Updated 2 years ago
- ☆12May 6, 2021Updated 4 years ago
- ☆15Mar 9, 2020Updated 6 years ago
- Analyze and manipulate binary data based on ELF symbol tables☆20Apr 3, 2024Updated 2 years ago
- -x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x- LD_PRELOAD based user-land rootkit for Linux platform.☆28Dec 10, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- ☆12Dec 2, 2021Updated 4 years ago
- Cross-assemblers, cross-binutils and cross-compilers needed for rebuilding the UPX stubs☆17Jan 8, 2026Updated 3 months ago
- Simple, WIP Linux x64 emulator using Windows Hypervisor Platform.☆17Jun 5, 2020Updated 5 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Aug 27, 2017Updated 8 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Oct 11, 2020Updated 5 years ago
- System Programming Project Ideas and Information for honors students☆20Nov 19, 2015Updated 10 years ago
- Modern Portfolio Website Using Next.js 14☆10Mar 15, 2024Updated 2 years ago
- A Kernel based root solution for Android☆28Mar 24, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Awesome SDR Tools , Libs :)☆29Dec 12, 2019Updated 6 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆83Dec 21, 2022Updated 3 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Mar 9, 2022Updated 4 years ago
- One more hobby operating system☆13Jun 17, 2020Updated 5 years ago
- ☆38May 31, 2017Updated 8 years ago
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.☆39Jan 7, 2021Updated 5 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆683Mar 25, 2025Updated last year
- Find jmp gadgets for call stack spoofing.☆79Oct 1, 2025Updated 6 months ago
- ☆28Jan 17, 2026Updated 2 months ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Dec 18, 2023Updated 2 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Compiled executables of common crypto and encoding algorithms☆16Oct 3, 2023Updated 2 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 9 years ago
- Just another elf library☆31Dec 28, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- collection of scripts and stuff☆12Aug 15, 2016Updated 9 years ago
- Demonstrate the behavior of the tunnel cache on Windows☆11Aug 13, 2019Updated 6 years ago
- Simple AutoIt crypter.☆11Mar 3, 2017Updated 9 years ago
- Here records some tips about pwn.☆12Mar 28, 2021Updated 5 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago