mahaloz / ike
'Ike: A binary exploitation and reversing handbook.
☆74Updated 2 months ago
Alternatives and similar repositories for ike:
Users that are interested in ike are comparing it to the libraries listed below
- ☆87Updated 10 months ago
- All Files, Scripts, and exploits can be found here☆61Updated 3 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ☆45Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆108Updated last year
- ☆161Updated 2 years ago
- Set of pre-generated pwn.college challenges☆65Updated 2 years ago
- ☆83Updated 7 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆62Updated 8 months ago
- A full English version of the popular ctf-wiki☆90Updated 8 months ago
- A tool for automating setup of kernel pwn challenges☆55Updated 4 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆149Updated 4 months ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆41Updated last year
- Slides from our technical talks☆29Updated 5 months ago
- Leveraging patch diffing to discover new vulnerabilities☆113Updated 5 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆87Updated 2 years ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆30Updated last year
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 10 months ago
- I will upload challenges I create for various ctf's or educational purposes here.☆23Updated 2 years ago
- 🐍 Solving CTF challenges using Z3 and Python☆56Updated last year
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆57Updated last month
- Very simple script(s) to hasten binary exploit creation☆92Updated 3 years ago
- Collection of pwn techniques☆28Updated 3 years ago
- Udemy – Linux Heap Exploitation☆39Updated 3 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆54Updated 3 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Resources to getting started vulnerability research on IoT/embedded devices.☆47Updated last week
- FSOP Again☆19Updated 2 years ago
- Cheat sheet of binary protections flags☆23Updated 4 years ago