maestron / reverse-engineering-tutorials
Reverse Engineering Tutorials
☆516Updated 6 years ago
Alternatives and similar repositories for reverse-engineering-tutorials:
Users that are interested in reverse-engineering-tutorials are comparing it to the libraries listed below
- hacking-tutorials☆331Updated 3 years ago
- collage of reverse engineering topics that I find interesting☆4Updated 4 years ago
- Some Reverse Engineering Tutorials for Beginners☆261Updated 2 years ago
- collection of articles/books about programing☆567Updated last year
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- OPCDE Cybersecurity Conference Materials☆611Updated 4 years ago
- A portable reverse engineering environment using docker.☆208Updated 6 years ago
- Malware exploits☆543Updated 5 years ago
- Demos of various injection techniques found in malware☆792Updated 3 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆893Updated 5 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆327Updated 8 years ago
- An archive of low-level CTF challenges developed over the years☆624Updated 3 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆906Updated 3 years ago
- Analysis of public exploits or my 1day exploits☆616Updated 4 years ago
- Some security related notes☆459Updated 7 years ago
- Exploit Development, Reverse Engineering & Cryptography☆250Updated 4 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,114Updated 4 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,181Updated 4 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆718Updated 4 years ago
- mXtract - Memory Extractor & Analyzer☆589Updated 3 years ago
- An in depth tutorial on how to do binary exploitation☆449Updated 6 years ago
- GitHub Project Resource List☆344Updated 8 years ago
- 👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets…☆176Updated 3 months ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago
- List of Awesome Advanced Windows Exploitation References☆1,478Updated 3 years ago
- Linux bind shell with anti-reverse engineering techniques☆285Updated 8 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Updated 3 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- Reverse Engineering Resources☆224Updated 6 years ago
- Kernel Hacking study materials collection☆110Updated 8 years ago