muhammet-mucahit / Security-ExercisesLinks
Buffer Overflow Exploitation Examples
☆43Updated 7 years ago
Alternatives and similar repositories for Security-Exercises
Users that are interested in Security-Exercises are comparing it to the libraries listed below
Sorting:
- ☆83Updated 7 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- The best resources for learning exploit development☆115Updated 5 years ago
- esoteric☆54Updated 4 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆77Updated 7 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- ☆68Updated 3 years ago
- my reading list for reverse engineering malware & exploit development☆14Updated 5 months ago
- ☆50Updated 6 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆44Updated 3 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆21Updated 6 years ago
- Assembly language files and Shellcode☆34Updated 3 years ago
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆48Updated last month
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Gonna share my writeups and resources here☆65Updated 5 months ago
- A curated list of resources for the OSED journey.☆64Updated 3 years ago
- Practice Labs☆92Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.☆27Updated 2 months ago
- a collection of Advanced Malwares and APT tools for geek analysts to play with☆44Updated 3 years ago
- 0xpat blog☆100Updated 3 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated 3 weeks ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago
- Random Exploits☆50Updated last year
- Cheat sheet of binary protections flags☆25Updated 4 years ago