mahaloz / ike
'Ike: A binary exploitation and reversing handbook.
☆75Updated 3 months ago
Alternatives and similar repositories for ike:
Users that are interested in ike are comparing it to the libraries listed below
- ☆89Updated 11 months ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- ☆162Updated 2 years ago
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆112Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Slides from our technical talks☆29Updated 6 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- A full English version of the popular ctf-wiki☆92Updated 9 months ago
- ☆83Updated 7 years ago
- Source code and documentation for TeamItaly CTF 2022 challenges☆40Updated last year
- My write-ups from various CTFs☆118Updated last year
- ☆46Updated last year
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆81Updated last year
- CTFs and solutions for Linux binary exploitation.☆108Updated 10 months ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆41Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated 3 weeks ago
- Udemy – Linux Heap Exploitation☆41Updated 3 years ago
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 10 months ago
- FSOP Again☆22Updated 3 years ago
- Contains all the components necessary to run a DC finals (attack-defense CTF) game from OOO.☆55Updated 3 years ago
- Cheat sheet of binary protections flags☆24Updated 4 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆103Updated 4 years ago
- Very simple script(s) to hasten binary exploit creation☆94Updated 3 years ago
- ☆45Updated 3 years ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆39Updated last week
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆213Updated last year
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago