scratchadams / PRE-ResourcesLinks
Protocol Reverse Engineering Resources
☆23Updated 2 years ago
Alternatives and similar repositories for PRE-Resources
Users that are interested in PRE-Resources are comparing it to the libraries listed below
Sorting:
- Slides about HyperDbg☆40Updated 6 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Updated 2 years ago
- ☆81Updated 7 months ago
- A library for patching ELFs☆61Updated 5 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Binary Golf Library☆61Updated 4 years ago
- Binary exploitation by confusing the unwinder☆67Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 months ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated 8 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆66Updated last year
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 4 months ago
- weggli ruleset scanner for source code and binaries☆35Updated last month
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- Notes on using the Python bindings for the Unicorn Engine☆80Updated 5 years ago
- ☆55Updated 7 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆126Updated last month
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆137Updated last year
- ☆133Updated 3 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆124Updated 2 months ago
- Kernel Read Write Execute☆83Updated last year
- ☆14Updated 4 years ago