seal9055 / resources
Collection of resources I have used throughout my studies (cybersecurity and systems)
☆213Updated last year
Alternatives and similar repositories for resources:
Users that are interested in resources are comparing it to the libraries listed below
- The best resources for learning exploit development☆113Updated 5 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- esoteric☆52Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆274Updated 4 years ago
- Write-ups for various CTF☆188Updated last year
- ☆183Updated last year
- ☆83Updated 7 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆103Updated 4 years ago
- Learn Binary Exploitation with sample problems and solutions☆141Updated 2 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆97Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated 3 weeks ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- My write-ups from various CTFs☆118Updated last year
- knowledge is power☆212Updated last year
- CTFs and solutions for Linux binary exploitation.☆108Updated 10 months ago
- ☆162Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆312Updated last month
- Gonna share my writeups and resources here☆65Updated 3 months ago
- ☆191Updated 7 years ago
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- ☆224Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆152Updated 5 months ago
- Collection of resources that are made by the Malware Research community☆225Updated last year
- Collection of browser challenges☆130Updated 3 years ago
- Hack-A-Sat Qualifiers Writeups☆250Updated 2 years ago
- Source code for the 2022 DEF CON Qualifiers.☆265Updated 10 months ago
- 'Ike: A binary exploitation and reversing handbook.☆75Updated 3 months ago