fareedfauzi / Flare-On-Challenges
This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.
☆319Updated last month
Alternatives and similar repositories for Flare-On-Challenges:
Users that are interested in Flare-On-Challenges are comparing it to the libraries listed below
- Windows Pwnable Study☆351Updated 4 years ago
- ☆162Updated 2 years ago
- Research notes☆123Updated 5 months ago
- ☆192Updated 7 years ago
- ☆90Updated last year
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆622Updated last month
- Assortment of hashing algorithms used in malware☆360Updated last month
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 11 months ago
- Write-ups for various CTF☆188Updated last year
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆502Updated 7 months ago
- A collection of pwn/CTF related utilities for Ghidra☆678Updated 7 months ago
- Code snips and notes☆137Updated 3 years ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆466Updated this week
- Quickly debug shellcode extracted during malware analysis☆603Updated last year
- HashDB API hash lookup plugin for IDA Pro☆316Updated 6 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆808Updated 11 months ago
- A Binary Genetic Traits Lexer Framework☆490Updated 2 months ago
- kernel-pwn and writeup collection☆611Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆628Updated last week
- ☆318Updated 10 months ago
- Dynamic unpacker based on PE-sieve☆730Updated last month
- ASLR bypass without infoleak☆160Updated 3 years ago
- PAWNYABLE!☆208Updated 11 months ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆418Updated 3 months ago
- Use angr in Ghidra☆582Updated 9 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆153Updated 5 months ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆665Updated 2 weeks ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Malduck is your ducky companion in malware analysis journeys☆330Updated this week