s4n7h0 / Practical-Reverse-Engineering-using-Radare2Links
Training Materials of Practical Reverse Engineering using Radare2
☆107Updated 8 years ago
Alternatives and similar repositories for Practical-Reverse-Engineering-using-Radare2
Users that are interested in Practical-Reverse-Engineering-using-Radare2 are comparing it to the libraries listed below
Sorting:
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- A set of scripts for a radare-based malware code analysis workflow☆68Updated 6 years ago
- GUI tool to create ROP chains using the ropper API☆157Updated 7 years ago
- Personal repository for all ctf related stuffs☆67Updated 11 months ago
- Radare Congress Stuff☆215Updated 11 months ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- WinHeap Explorer repository.☆119Updated 7 years ago
- Radare 2 wiki☆94Updated 5 years ago
- ☆90Updated last year
- r2con 2017 September 6-9☆97Updated 8 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- r2con2019 - slides and materials☆137Updated 5 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 6 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- Helper script for working with format string bugs☆57Updated 5 years ago
- Sourcecode created during my Livestream (English)☆112Updated 5 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆99Updated 7 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- GDB + GEF cheatsheet for reversing binaries☆74Updated 2 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- Setup for a pwning VM☆62Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆299Updated 2 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- A portable reverse engineering environment using docker.☆211Updated 7 years ago