scratchadams / Heap-Resources
Heap Exploitation Resources
☆18Updated last year
Alternatives and similar repositories for Heap-Resources:
Users that are interested in Heap-Resources are comparing it to the libraries listed below
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Binary Golf Library☆62Updated 4 years ago
- Protocol Reverse Engineering Resources☆21Updated last year
- Binary Golf Grand Prix☆111Updated last year
- Exercises from Designing BSD Rootkits working in 2020 with FreeBSD 12.2☆47Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- Binary Golf Grand Prix☆55Updated last month
- Cheat sheet of binary protections flags☆25Updated 4 years ago
- yxd - Yuu's heX Dumper☆88Updated 10 months ago
- ☆20Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆87Updated 2 years ago
- examples of using radius2 to solve reversing challenges☆35Updated 4 months ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- ☆48Updated 11 months ago
- a pstree mod that prints other helpful information and with added functionality☆24Updated 4 years ago
- ☆45Updated last month
- Small Rust programs that do weird things☆30Updated 3 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆145Updated 2 years ago
- ☆61Updated 10 months ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Corrupted files generator. Random bits flipper.☆24Updated last year
- 'Ike: A binary exploitation and reversing handbook.☆75Updated 3 months ago
- Binary Golf Examples and Resources☆253Updated 10 months ago
- ☆24Updated 3 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆29Updated last year
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆64Updated 3 years ago
- ☆83Updated 7 years ago