muhammet-mucahit / Security-ExercisesLinks
Buffer Overflow Exploitation Examples
☆46Updated 7 years ago
Alternatives and similar repositories for Security-Exercises
Users that are interested in Security-Exercises are comparing it to the libraries listed below
Sorting:
- Malware Analysis Tools☆31Updated 6 years ago
- RE / Binary Exploitation Resources☆72Updated 8 years ago
- This repository contains writeups for various CTFs I've participated in (Including Hack The Box).☆156Updated 3 weeks ago
- Resources for learning malware analysis and reverse engineering☆140Updated last year
- The best resources for learning exploit development☆120Updated 6 years ago
- ☆82Updated 8 years ago
- 0xpat blog☆108Updated 4 years ago
- ☆53Updated 2 years ago
- esoteric☆54Updated 5 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- A list of attacks or malware using steganography or information hiding☆68Updated last year
- Set of pre-generated pwn.college challenges☆68Updated 2 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆240Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆84Updated 8 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆124Updated 2 years ago
- All CTF events☆75Updated 4 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 6 months ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆122Updated 6 years ago
- Android malware sample library.☆70Updated 3 years ago
- Gonna share my writeups and resources here☆68Updated 10 months ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 3 years ago
- My writeups of various CTFs & security challenges☆73Updated last month
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Updated 3 years ago
- Some malware samples or suspicious files I found and their reports.☆37Updated 4 years ago