Reversing list
☆150Jan 9, 2024Updated 2 years ago
Alternatives and similar repositories for reversing-list
Users that are interested in reversing-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF Reversing Challenges List☆290Jul 3, 2019Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Dec 22, 2019Updated 6 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆34Nov 21, 2020Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Mar 29, 2026Updated 3 weeks ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- CTF write-ups repository☆42Jul 8, 2023Updated 2 years ago
- Repository to store summaries of CTF challenges☆28Aug 26, 2023Updated 2 years ago
- Reverse Engineering challenges☆38Dec 23, 2020Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Some pwn challenges selected for training and education.☆389Jun 26, 2023Updated 2 years ago
- Crackmes Keygenmes Serialmes y más☆44Sep 11, 2022Updated 3 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆397Jan 15, 2023Updated 3 years ago
- Open and censorship resistant crackmes repository☆130Dec 15, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- collection of helper tools for fuzzing☆17Oct 3, 2023Updated 2 years ago
- Linux kernel internals' notes☆20Feb 12, 2026Updated 2 months ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- Capture The Flag competition challenge write-ups☆23Mar 1, 2026Updated last month
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Solutions to some crackmes that I have done.☆72Nov 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Makers tasks by SDSLabs.☆17Apr 17, 2020Updated 6 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆66Jan 31, 2020Updated 6 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆226May 6, 2023Updated 2 years ago
- GDB for pwn☆11Sep 10, 2025Updated 7 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Initiative to collect and preserve crackmes for learning and practice in reverse engineering☆117Nov 8, 2021Updated 4 years ago
- An in depth tutorial on how to do binary exploitation☆455Jun 19, 2018Updated 7 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Sep 16, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A set of Linux binary exploitation tasks for beginners on various architectures☆551Dec 26, 2021Updated 4 years ago
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- Dataset of packed ELF samples☆21Jan 24, 2026Updated 2 months ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- My solutions to RPISEC's Modern Binary Exploitation course lab☆15Mar 9, 2018Updated 8 years ago
- ☆89Jun 3, 2018Updated 7 years ago
- Run Ubuntu easily on macOS (Big Sur compatible)☆23Jan 16, 2021Updated 5 years ago