geyslan / crackmesLinks
Have fun!
☆31Updated 8 years ago
Alternatives and similar repositories for crackmes
Users that are interested in crackmes are comparing it to the libraries listed below
Sorting:
- 0-ring rootkit revealer for Linux☆29Updated 6 years ago
- ☆35Updated 13 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- Random number rootkit for the Linux kernel☆28Updated 9 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆45Updated 9 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Corewars but within r2☆60Updated last year
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Library for Dissect and Infect ELF Binaries.☆40Updated 9 months ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Melkor is a very intuitive and easy-to-use ELF file format fuzzer to find functional and security bugs in ELF parsers.☆153Updated 2 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- A port of Kaitai to the Hiew hex editor☆149Updated 5 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 13 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆100Updated 9 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 5 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 8 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Updated 4 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- Kopycat is an emulator of hardware platforms of various architectures☆80Updated 4 months ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- A book on learning radare2.☆48Updated 5 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Updated 8 years ago
- Solutions for various crackmes☆20Updated 13 years ago
- Learn the very basics of different languages☆49Updated 10 months ago