ifding / learning-notesLinks
Always Keep Learning
☆58Updated 3 years ago
Alternatives and similar repositories for learning-notes
Users that are interested in learning-notes are comparing it to the libraries listed below
Sorting:
- Kernel Hacking study materials collection☆110Updated 9 years ago
- Learning Linux Binary Analysis, published by Packt☆85Updated 2 years ago
- This is an example buffer overflow attack on a small vulnerable C program.☆80Updated 9 years ago
- As near as possible to bare metal☆48Updated 2 months ago
- My own versions from the programs of the book "Practical Binary Analysis"☆55Updated 6 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Пример руткита для ядра линукс 5☆19Updated 4 years ago
- Tutorial Reverse Engineering☆44Updated 9 years ago
- Free IDA Pro Binary Auditing Training Material for University Lectures - from http://binary-auditing.com . Contains decrypted/unzipped fi…☆175Updated 2 years ago
- Source code for 'Modern X86 Assembly Language Programming' by Daniel Kusswurm☆168Updated 5 years ago
- Quick introduction to reverse engineering for beginners☆75Updated 12 years ago
- This is a series of small articles / tutorials based around virtual memory. The goal is to learn some CS basics, but in a different and m…☆326Updated 5 years ago
- Linux kernel internals' notes☆20Updated last year
- Collection of Linux Kernel Modules and PoC to discover, learn and practice Linux Kernel Development☆53Updated 5 years ago
- A collection of solutions and other inspiring material to Dennis Andriesse's 'Practical Binary Analysis' book.☆33Updated 4 years ago
- Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.…☆35Updated 2 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- A quick PoC to try out the "meltdown" timing attack.☆155Updated 7 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆159Updated 6 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆232Updated 3 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆98Updated 7 years ago
- Reversing list☆149Updated last year
- Official archive of https://code.google.com/p/cryptospecs/☆76Updated 6 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 7 years ago
- MOVING TO: https://cirosantilli.com/linux-kernel-module-cheat/#algorithms see README. Algorithm tutorials and simple multi-language imple…☆80Updated 5 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆36Updated 6 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆24Updated 5 years ago
- Spectre exploit☆55Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago