scratchadams / Heap-Resources
Heap Exploitation Resources
☆18Updated last year
Alternatives and similar repositories for Heap-Resources:
Users that are interested in Heap-Resources are comparing it to the libraries listed below
- Protocol Reverse Engineering Resources☆20Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Binary Golf Grand Prix☆52Updated last week
- Binary Golf Grand Prix☆111Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 2 weeks ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆46Updated 4 months ago
- Binary Golf Examples and Resources☆252Updated 8 months ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- yxd - Yuu's heX Dumper☆88Updated 8 months ago
- 'Ike: A binary exploitation and reversing handbook.☆74Updated 2 months ago
- ☆10Updated 2 years ago
- ☆77Updated 9 months ago
- DC540 hacking challenge 0x00001.☆26Updated last year
- Find RSA primes in files☆20Updated 2 years ago
- Binary Golf Library☆62Updated 3 years ago
- ☆44Updated 3 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆42Updated 3 years ago
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆46Updated 2 years ago
- Custom Binary Ninja Themes☆12Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆58Updated 4 months ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 4 years ago
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Updated last year
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- ☆23Updated last month
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆101Updated 2 years ago
- ☆10Updated 3 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆95Updated this week
- ☆83Updated 7 years ago