msuiche / OPCDELinks
OPCDE Cybersecurity Conference Materials
☆619Updated 5 years ago
Alternatives and similar repositories for OPCDE
Users that are interested in OPCDE are comparing it to the libraries listed below
Sorting:
- Ephemera and other documentation associated with the 1337list project.☆395Updated 7 years ago
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆235Updated 9 months ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆411Updated 5 years ago
- Conference slides and White-papers☆359Updated 5 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 7 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Updated 4 years ago
- Collaborative malware analysis framework☆379Updated 6 years ago
- Various snippets created during malware analysis☆461Updated 2 months ago
- rVMI - A New Paradigm For Full System Analysis☆359Updated 8 years ago
- A Course on Intermediate Level Linux Exploitation☆1,007Updated 5 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆399Updated 9 years ago
- Security, hacking conferences (list)☆546Updated 2 weeks ago
- CTFs, solutions and presentations☆295Updated last month
- Some security related notes☆461Updated 8 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆170Updated 6 years ago
- Kinda useful notes collated together publicly☆498Updated 6 years ago
- Code written as part of our various malware investigations☆407Updated last month
- VolatilityBot – An automated memory analyzer for malware samples and memory dumps☆273Updated 4 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆476Updated 4 years ago
- Linux bind shell with anti-reverse engineering techniques☆287Updated 8 years ago
- Information released publicly by NCC Group's Cyber Incident Response Team☆476Updated 4 years ago
- Interactive shellcoding environment to easily craft shellcodes☆904Updated 4 years ago
- Files from my DEFCON CTF VM.☆273Updated 9 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode☆728Updated 2 years ago
- The iCTF Framework, presented by Shellphish!☆335Updated 2 years ago
- A tool to retrieve malware directly from the source for security researchers.☆564Updated 8 years ago
- Red Team Tactics, Techniques, and Procedures☆419Updated 2 months ago
- Reverse Engineering Tutorials☆524Updated 7 years ago