rustymagnet3000 / Reverse-Engineering-C-challengesLinks
Reverse Engineering challenges
☆36Updated 5 years ago
Alternatives and similar repositories for Reverse-Engineering-C-challenges
Users that are interested in Reverse-Engineering-C-challenges are comparing it to the libraries listed below
Sorting:
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆372Updated 9 months ago
- Windows Pwnable Study☆394Updated 6 months ago
- reverse engninering & pwn writeup☆26Updated 5 years ago
- ☆81Updated 8 years ago
- Udemy – Linux Heap Exploitation☆53Updated 4 years ago
- ☆55Updated 7 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆53Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆72Updated 4 years ago
- ☆199Updated 8 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- FSOP Again☆31Updated 3 years ago
- A research paper about the internals of memory management and heap exploitation☆27Updated 3 years ago
- ASLR bypass without infoleak☆165Updated 4 years ago
- Writeups of some Reverse Engineering challenges in CTFs I played☆32Updated 4 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆102Updated 4 months ago
- ☆178Updated 3 years ago
- 🐍 Solving CTF challenges using Z3 and Python☆62Updated 2 years ago
- A curated list of Game Challenges from various CTFs☆193Updated 4 years ago
- RE / Binary Exploitation Resources☆72Updated 8 years ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆71Updated last year
- Writeups for CTFs☆78Updated 4 months ago
- An intuitive query API for IDA Pro☆165Updated 2 months ago
- ☆119Updated last year
- My notes on pwn☆290Updated last week
- Write-ups for various CTF☆217Updated 4 months ago
- Solutions to some crackmes that I have done.☆71Updated 3 years ago
- Initiative to collect and preserve crackmes for learning and practice in reverse engineering☆114Updated 4 years ago
- ☆263Updated 2 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆649Updated 9 months ago