seal9055 / resourcesLinks
Collection of resources I have used throughout my studies (cybersecurity and systems)
☆224Updated last year
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below
Sorting:
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆57Updated 2 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- All Files, Scripts, and exploits can be found here☆66Updated 4 years ago
- Gonna share my writeups and resources here☆67Updated 7 months ago
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- The best resources for learning exploit development☆117Updated 5 years ago
- ☆168Updated 3 years ago
- Learn Binary Exploitation with sample problems and solutions☆152Updated 2 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆105Updated 4 years ago
- My write-ups from various CTFs☆118Updated last year
- knowledge is power☆225Updated 3 weeks ago
- esoteric☆55Updated 4 years ago
- ☆84Updated 7 years ago
- CTF writeups from The Flat Network Society☆143Updated last month
- Collection of resources for my preparation to take the OSEE certification.☆284Updated 4 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆75Updated this week
- 💻 CTF Heaven☆276Updated 5 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆342Updated 5 months ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆108Updated 2 years ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆347Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆161Updated 9 months ago
- Resources for learning about Exploit Development☆402Updated 4 years ago
- 'Ike: A binary exploitation and reversing handbook.☆83Updated 7 months ago
- ☆239Updated 2 years ago
- Write-ups for various CTF☆193Updated last year
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆706Updated 10 months ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- ☆195Updated 7 years ago
- ☆103Updated last year