gerasdf / InsecureProgramming
Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them
☆269Updated 7 years ago
Alternatives and similar repositories for InsecureProgramming:
Users that are interested in InsecureProgramming are comparing it to the libraries listed below
- Some security related notes☆458Updated 7 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆275Updated 4 years ago
- Exploitation on ARM-based Systems (Troopers18)☆147Updated 7 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- An archive of low-level CTF challenges developed over the years☆629Updated 3 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆383Updated 6 years ago
- An in depth tutorial on how to do binary exploitation☆451Updated 6 years ago
- CTFs, solutions and presentations☆288Updated 2 weeks ago
- Solutions to a variety of Capture The Flag challenges from different competitions.☆211Updated 5 years ago
- Exploitation and Mitigation Slides☆128Updated 10 months ago
- collage of reverse engineering topics that I find interesting☆5Updated 4 years ago
- Ephemera and other documentation associated with the 1337list project.☆395Updated 6 years ago
- ☆182Updated 5 years ago
- ☆347Updated 9 years ago
- A vulnerable C program for testing fuzzers.☆196Updated 2 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- A thorough library database to assist with binary exploitation tasks.☆198Updated 2 years ago
- Ejercicios y teoría sobre explotación de binarios y búsqueda de vulnerabilidades.☆41Updated 5 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆181Updated 10 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Radare2 cheat-sheet☆113Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆895Updated 4 years ago
- Reverse Engineering using Radare2☆317Updated 3 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆184Updated 10 months ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆526Updated 4 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆233Updated last month
- Intro to radare2 presentation files.☆84Updated 7 years ago
- A colleciton of CTF write-ups all using pwntools☆513Updated 8 years ago
- A Course on Intermediate Level Linux Exploitation☆1,000Updated 4 years ago
- Vulnerability examples.☆404Updated 11 months ago