muhammet-mucahit / Security-ExercisesLinks
Buffer Overflow Exploitation Examples
☆46Updated 7 years ago
Alternatives and similar repositories for Security-Exercises
Users that are interested in Security-Exercises are comparing it to the libraries listed below
Sorting:
- A list of attacks or malware using steganography or information hiding☆67Updated last year
- Resources for learning malware analysis and reverse engineering☆135Updated last year
- RE / Binary Exploitation Resources☆72Updated 7 years ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- 0xpat blog☆104Updated 4 years ago
- This repository contains writeups for various CTFs I've participated in (Including Hack The Box).☆153Updated 4 months ago
- The best resources for learning exploit development☆119Updated 6 years ago
- Malware Analysis Tools☆30Updated 6 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆123Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- ☆82Updated 8 years ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆30Updated 2 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- ☆52Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆236Updated 2 years ago
- Run several volatility plugins at the same time☆115Updated 3 years ago
- ☆32Updated 3 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆61Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 8 months ago
- Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
- Gonna share my writeups and resources here☆69Updated 9 months ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 4 months ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆45Updated 2 years ago
- esoteric☆54Updated 5 years ago
- Cryptography Tool | RSA Attacks☆110Updated 2 years ago
- Writeup for the challenges in NahamCon CTF 2020☆81Updated 5 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆30Updated 5 months ago
- All CTF events☆75Updated 4 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆47Updated 3 years ago