gerasdf / InsecureProgramming
Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them
☆252Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for InsecureProgramming
- Some security related notes☆457Updated 7 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆269Updated 4 years ago
- Guía introductoria a la escritura de exploits☆67Updated 3 years ago
- Exploitation on ARM-based Systems (Troopers18)☆146Updated 6 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- Ejercicios y teoría sobre explotación de binarios y búsqueda de vulnerabilidades.☆40Updated 5 years ago
- Material for a RE 101 class on Intel x64 binaries☆165Updated 4 years ago
- ☆343Updated 9 years ago
- ☆181Updated 4 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 7 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆384Updated 5 years ago
- An archive of low-level CTF challenges developed over the years☆609Updated 2 years ago
- collage of reverse engineering topics that I find interesting☆1Updated 4 years ago
- Reversing list☆144Updated 10 months ago
- Ephemera and other documentation associated with the 1337list project.☆396Updated 6 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆167Updated 5 years ago
- Reverse Engineering using Radare2☆309Updated 2 years ago
- Radare2 cheat-sheet☆111Updated 6 years ago
- Corewars but within r2☆57Updated 5 months ago
- Kernel Hacking study materials collection☆106Updated 8 years ago
- A port of Kaitai to the Hiew hex editor☆144Updated 4 years ago
- Linux bind shell with anti-reverse engineering techniques☆284Updated 7 years ago
- Vulnerability examples.☆399Updated 6 months ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 3 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 7 years ago
- Tutorial for writing kernel exploits☆250Updated 6 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆226Updated this week
- Tips, Tricks, and Suggestions for Running a CTF☆383Updated 2 years ago
- Source graveyard and random candy for radare2☆241Updated this week
- Useful tips by OTA CTF members☆135Updated 5 years ago