enovella / reverse-engineering-reference-manual
Here is a collage of reverse engineering topics that I find interesting
☆11Updated 7 years ago
Alternatives and similar repositories for reverse-engineering-reference-manual:
Users that are interested in reverse-engineering-reference-manual are comparing it to the libraries listed below
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- I will upload challenges I create for various ctf's or educational purposes here.☆23Updated 2 years ago
- Anti-reverse Compilation☆32Updated 3 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆75Updated 5 months ago
- ☆46Updated 6 years ago
- ☆48Updated 3 years ago
- Solutions to Flare-On 10 CTF☆13Updated last year
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 4 years ago
- A javascript dll resolver for v8☆11Updated 4 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Updated 4 years ago
- ☆14Updated 3 years ago
- ☆28Updated 2 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago
- reverse engninering & pwn writeup☆24Updated 4 years ago
- ☆72Updated 3 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- ☆75Updated 2 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆37Updated last year
- qiling framework examples☆16Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆183Updated 11 months ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆45Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 2 years ago
- a repo of links to useful writeups of pwn challenges☆26Updated 6 years ago
- This repository houses the materials, slides and exercises from the r2con 2020 walkthrough sessions.☆36Updated 4 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Malware dynamic instrumentation tool based on frida framework☆104Updated 4 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- ☆45Updated last year