sdutjava1604 / binary-introductory-books-for-beginnersLinks
二进制入门书籍
☆262Updated 6 years ago
Alternatives and similar repositories for binary-introductory-books-for-beginners
Users that are interested in binary-introductory-books-for-beginners are comparing it to the libraries listed below
Sorting:
- 《深入理解恶意代码与病毒样本》☆221Updated 2 years ago
- 《逆向工程核心原理》源码及程序示例☆137Updated 6 years ago
- 《二进制安全测试与安全研究》☆116Updated last year
- Syclover 二进制方向招新培训☆278Updated 4 years ago
- CTF竞赛权威指南(Pwn篇) 相关资源☆175Updated 2 years ago
- 网安类绝版图书(二)☆82Updated 2 years ago
- 二进制安全高级参考资料☆123Updated 6 years ago
- 恶意代码分析实战系列文章☆167Updated 2 years ago
- 恶意代码分析实战程序-PracticalMalwareAnalysis-Labs-master☆47Updated 6 years ago
- 滴水三期课后习题答案☆108Updated 8 months ago
- IoT安全教程☆299Updated 5 years ago
- 两年二进制安全pwn方向学习笔记(包含linux内核,程序链接装载,libc库源码等)☆40Updated last year
- 对160个Crackme的详细分析记录☆483Updated 6 years ago
- 记录一下自己的病毒分析成果☆253Updated 4 years ago
- 该资源为系统安全和逆向分析实验,包括作者从零学习恶意代码分析、病毒逆向分析的工具及样本,基础性文章,希望对您有所帮助~☆896Updated last year
- c 编程语言☆240Updated 3 years ago
- CTF PWN 做题环境一键搭建脚本☆160Updated last year
- 《Linux提权方法论》☆800Updated 2 years ago
- IDA插件集合,含项目名称及项目地址,每日定时Clone项目。☆467Updated this week
- Binary Hacking Study Notes☆253Updated 2 years ago
- 0day安全_软件漏洞分析技术☆640Updated 7 years ago
- 二进制安全系列课程。以 CTF(Capture The Flag) 为导向,预计将会包括 Basic(基础知识)、 Pwn(二进制漏洞利用) 与 Reverse(逆向工程) 三部分主要内容以及 Other(其他内容)。☆117Updated 9 months ago
- 安全导图☆261Updated last year
- Collect some iot-related security articles, including vulnerability analysis, security conferences and papers, etc.☆298Updated 11 months ago
- 汇总了目前可以找到的所有的进程注入的方式,完成了x86/x64下的测试,不断更新中☆284Updated 3 years ago
- This is a simple network firewall for pwn challenges of ctf awd competition, light and simple code.There is no dependence, the log format…☆210Updated 2 years ago
- Resource assembly of 'Binary Security Tutorial' online course of mine. Video link:https://pan.baidu.com/s/1ltcHIehhLFVFMvru6tGQ8A Passwd:…☆244Updated 6 years ago
- 🔍 LibcSearcher-ng -- get symbols' offset in glibc.☆110Updated 2 years ago
- IDA Pro每周小技巧☆279Updated 3 years ago
- 海特实验室物联网安全知识库☆159Updated 5 years ago