ebtaleb / peda_cheatsheet
☆24Updated 8 years ago
Alternatives and similar repositories for peda_cheatsheet:
Users that are interested in peda_cheatsheet are comparing it to the libraries listed below
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Exploitation and Mitigation Slides☆127Updated 8 months ago
- esoteric☆51Updated 4 years ago
- OSEE Preparation☆174Updated 6 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆110Updated 5 years ago
- Useful tips by OTA CTF members☆137Updated 5 years ago
- ☆87Updated 6 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆143Updated 5 years ago
- How to build an efficient pwn development environment in 2020☆259Updated 4 years ago
- ☆108Updated 5 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆52Updated 8 years ago
- Very simple script(s) to hasten binary exploit creation☆92Updated 3 years ago
- Manage building and deploying exploitation challenges with ease☆57Updated 3 months ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- notes and code on past CTFs☆102Updated 3 years ago
- My solutions to RPISEC's Modern Binary Exploitation course lab☆14Updated 6 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆212Updated last year
- Fork of mona.py with x64dbg support☆99Updated 2 years ago
- Reversing list☆146Updated last year
- ☆159Updated 2 years ago
- Linux Heap Exploitation Practice☆377Updated 6 years ago
- ☆152Updated 2 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- ☆182Updated 7 years ago
- Collection of scripts and writeups☆320Updated 3 years ago
- VoidHack CTF write-ups☆59Updated 5 years ago
- Code and exercises for a workshop on z3 and angr☆226Updated 4 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆21Updated 3 years ago
- Some CTF write up☆244Updated 3 years ago