msuiche / OPCDELinks
OPCDE Cybersecurity Conference Materials
☆619Updated 5 years ago
Alternatives and similar repositories for OPCDE
Users that are interested in OPCDE are comparing it to the libraries listed below
Sorting:
- Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs☆240Updated 11 months ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Updated 5 years ago
- Ephemera and other documentation associated with the 1337list project.☆395Updated 7 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Updated 8 years ago
- A Course on Intermediate Level Linux Exploitation☆1,009Updated 5 years ago
- Conference slides and White-papers☆360Updated 6 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆342Updated 7 years ago
- Various snippets created during malware analysis☆465Updated 4 months ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,046Updated 4 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 6 years ago
- Collaborative malware analysis framework☆380Updated 7 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328Updated 4 years ago
- Interactive shellcoding environment to easily craft shellcodes☆907Updated 4 years ago
- Code written as part of our various malware investigations☆409Updated 2 months ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 3 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Updated 4 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆404Updated last year
- Kinda useful notes collated together publicly☆501Updated 6 years ago
- CTFs, solutions and presentations☆296Updated 3 months ago
- Files from my DEFCON CTF VM.☆273Updated 9 years ago
- An in depth tutorial on how to do binary exploitation☆455Updated 7 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398Updated 9 years ago
- Decept Network Protocol Proxy☆279Updated 3 years ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- Reverse Engineering Tutorials☆525Updated 7 years ago
- A portable reverse engineering environment using docker.☆217Updated 7 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆904Updated 5 years ago
- Kaspersky's GReAT KLara☆730Updated last year
- Security, hacking conferences (list)☆548Updated 2 weeks ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 8 years ago