mytechnotalent / dc540-0x00001
DC540 hacking challenge 0x00001.
☆26Updated last year
Related projects ⓘ
Alternatives and complementary repositories for dc540-0x00001
- Set of pre-generated pwn.college challenges☆59Updated last year
- Cheat sheet of binary protections flags☆22Updated 4 years ago
- ☆81Updated 7 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆98Updated 4 years ago
- RE / Binary Exploitation Resources☆67Updated 6 years ago
- SSD Challenges☆47Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆87Updated last year
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 2 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆42Updated 2 years ago
- esoteric☆50Updated 4 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆47Updated 7 months ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆63Updated 3 years ago
- ☆46Updated last year
- Code snippets for bare-metal malware development☆96Updated 2 years ago
- My solutions to the 2020 NSA Codebreaker Challenge☆75Updated 3 years ago
- ☆45Updated 5 years ago
- Protocol Reverse Engineering Resources☆19Updated last year
- Anti-reverse Compilation☆32Updated 3 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆45Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 3 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆98Updated last year
- Solutions to some crackmes that I have done.☆60Updated 2 years ago
- The best resources for learning exploit development☆108Updated 5 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago