scratchadams / Heap-Resources
Heap Exploitation Resources
☆17Updated last year
Related projects: ⓘ
- Code snippets for bare-metal malware development☆94Updated 2 years ago
- Protocol Reverse Engineering Resources☆19Updated last year
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆44Updated last year
- Binary Golf Grand Prix☆43Updated 2 weeks ago
- A series of writes about “Binary Exploitation”.☆87Updated last year
- ☆36Updated 2 weeks ago
- Binary Golf Grand Prix☆109Updated 10 months ago
- LD_PRELOAD rootkit☆122Updated 6 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆26Updated 2 years ago
- Cheat sheet of binary protections flags☆22Updated 4 years ago
- ☆41Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- ☆10Updated 2 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 2 years ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆45Updated last week
- Binary Golf Library☆62Updated 3 years ago
- ☆44Updated this week
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆139Updated last year
- yxd - Yuu's heX Dumper☆87Updated 2 months ago
- ☆52Updated this week
- Generate very tiny reverse shell binaries for Linux~☆74Updated 4 years ago
- This repositery contains the slides, sometimes videos, and materials of my talks.☆25Updated last month
- a pstree mod that prints other helpful information and with added functionality☆23Updated 4 years ago
- Hands-on workshop on the basics of hardware hacking.☆114Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆11Updated 2 years ago
- Papers, presentations and documents from the team at Hacker House.☆49Updated 5 years ago
- ☆58Updated 2 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆47Updated last year
- examples of using radius2 to solve reversing challenges☆24Updated 8 months ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆36Updated 8 months ago