gynvael / ifaceLinks
Rather bad Windows/Linux RPC interface specialized for a Windows-host/Linux-guest configuration.
☆55Updated 6 years ago
Alternatives and similar repositories for iface
Users that are interested in iface are comparing it to the libraries listed below
Sorting:
- Gynvael's Livestream code☆136Updated last year
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- ☆72Updated 6 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆159Updated 9 years ago
- ☆25Updated 6 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- ☆16Updated 6 years ago
- 34C3 Junior CTF pwnables☆117Updated 6 years ago
- A portable reverse engineering environment using docker.☆208Updated 6 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆235Updated 4 months ago
- Guide to buffer overflows☆58Updated 3 years ago
- Small tool for generating ropchains using unicorn and z3☆198Updated 7 years ago
- ☆25Updated 9 years ago
- Materials for CTF101 Day 2 (Systems Security)☆11Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- ☆77Updated 10 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- Blogging about reversing "script kiddie" style malware.☆98Updated 10 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 7 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- ☆21Updated 7 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- This repository contains a docker container dedicated to reverse engineering☆85Updated 6 years ago
- ☆280Updated 5 years ago
- exploit-exercises holds my solutions and thoughts on the exercises on exploit-exercises.com☆31Updated 6 years ago
- ☆10Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆55Updated 9 years ago
- Linux bind shell with anti-reverse engineering techniques☆288Updated 8 years ago
- Your bag of handy codes for malware researchers☆121Updated 5 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago