Reversing list
☆149Jan 9, 2024Updated 2 years ago
Alternatives and similar repositories for reversing-list
Users that are interested in reversing-list are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF Reversing Challenges List☆289Jul 3, 2019Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Dec 22, 2019Updated 6 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆35Nov 21, 2020Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Feb 26, 2026Updated last month
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- CTF write-ups repository☆42Jul 8, 2023Updated 2 years ago
- Reverse Engineering challenges☆37Dec 23, 2020Updated 5 years ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- Writeups of Capture The Flag Competitions☆123Jul 13, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Some pwn challenges selected for training and education.☆388Jun 26, 2023Updated 2 years ago
- Crackmes Keygenmes Serialmes y más☆43Sep 11, 2022Updated 3 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆395Jan 15, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Open and censorship resistant crackmes repository☆129Dec 15, 2019Updated 6 years ago
- collection of helper tools for fuzzing☆17Oct 3, 2023Updated 2 years ago
- Linux kernel internals' notes☆20Feb 12, 2026Updated last month
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- Capture The Flag competition challenge write-ups☆22Mar 1, 2026Updated 3 weeks ago
- Solutions to some crackmes that I have done.☆72Nov 2, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Makers tasks by SDSLabs.☆17Apr 17, 2020Updated 5 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆66Jan 31, 2020Updated 6 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆227May 6, 2023Updated 2 years ago
- GDB for pwn☆11Sep 10, 2025Updated 6 months ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Initiative to collect and preserve crackmes for learning and practice in reverse engineering☆116Nov 8, 2021Updated 4 years ago
- An in depth tutorial on how to do binary exploitation☆454Jun 19, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆551Dec 26, 2021Updated 4 years ago
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- Dataset of packed ELF samples☆20Jan 24, 2026Updated 2 months ago
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- My solutions to RPISEC's Modern Binary Exploitation course lab☆15Mar 9, 2018Updated 8 years ago
- ☆89Jun 3, 2018Updated 7 years ago