pwncollege / computing-101Links
A dojo to teach the basics of low-level computing.
☆15Updated this week
Alternatives and similar repositories for computing-101
Users that are interested in computing-101 are comparing it to the libraries listed below
Sorting:
- the challenge generation framework for pwn.college☆22Updated last month
- ☆31Updated this week
- Learning FreeBSD Kernel Hacking - Exercises☆41Updated 5 years ago
- Binary Golf Grand Prix☆57Updated 2 months ago
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- Slides about HyperDbg☆30Updated 2 months ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆65Updated 5 months ago
- ☆12Updated last month
- Binary Golf Grand Prix☆111Updated last year
- House of Gods Heap Exploitation Technique☆18Updated 2 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- FSOP Again☆23Updated 3 years ago
- ☆28Updated 4 months ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- Kernel Read Write Execute☆43Updated 4 months ago
- ☆12Updated last year
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆47Updated 2 years ago
- Binary Golf Library☆62Updated 4 years ago
- Industrial IR-based static analysis framework for Java bytecode☆9Updated last year
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆93Updated 2 years ago
- Shiva is a programmable dynamic linker for loading ELF microprograms☆32Updated last year
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆41Updated last year
- CMU Systems Programming course resources incl. course website, labs, schedule, & extra material. Books: "Computer Systems: A Programmer's…☆34Updated last year
- Coverage-Guided Greybox Distributed Fuzzer☆131Updated last month
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆48Updated 7 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 5 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.