msuiche / OPCDELinks
OPCDE Cybersecurity Conference Materials
☆616Updated 5 years ago
Alternatives and similar repositories for OPCDE
Users that are interested in OPCDE are comparing it to the libraries listed below
Sorting:
- Ephemera and other documentation associated with the 1337list project.☆395Updated 7 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆236Updated 6 months ago
- rVMI - A New Paradigm For Full System Analysis☆357Updated 7 years ago
- Various snippets created during malware analysis☆458Updated 2 weeks ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Updated 4 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 6 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 6 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 4 years ago
- Conference slides and White-papers☆358Updated 5 years ago
- CTFs, solutions and presentations☆291Updated 3 weeks ago
- Collaborative malware analysis framework☆377Updated 6 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- A Course on Intermediate Level Linux Exploitation☆1,001Updated 5 years ago
- Interactive shellcoding environment to easily craft shellcodes☆902Updated 4 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398Updated 9 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- Security, hacking conferences (list)☆531Updated this week
- ☆350Updated 10 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,007Updated 6 years ago
- Some security related notes☆460Updated 8 years ago
- Kinda useful notes collated together publicly☆497Updated 6 years ago
- Red Team Tactics, Techniques, and Procedures☆411Updated last month
- Reverse Engineering Tutorials☆522Updated 7 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆902Updated 5 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆730Updated 2 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆275Updated 4 years ago
- Files from my DEFCON CTF VM.☆270Updated 9 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆476Updated 4 years ago
- A tool to help you write binary exploits☆605Updated 6 years ago