seal9055 / resourcesLinks
Collection of resources I have used throughout my studies (cybersecurity and systems)
☆223Updated last year
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below
Sorting:
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆54Updated last year
- Stash for Binary Exploitation and Reverse Engineering Resources☆104Updated 4 years ago
- knowledge is power☆218Updated last month
- Gonna share my writeups and resources here☆66Updated 6 months ago
- CTFs and solutions for Linux binary exploitation.☆110Updated last year
- esoteric☆55Updated 4 years ago
- ☆164Updated 2 years ago
- The best resources for learning exploit development☆115Updated 5 years ago
- My write-ups from various CTFs☆118Updated last year
- ☆84Updated 7 years ago
- Learn Binary Exploitation with sample problems and solutions☆148Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- 💻 CTF Heaven☆272Updated 3 months ago
- Set of pre-generated pwn.college challenges☆67Updated 2 years ago
- CTF writeups from The Flat Network Society☆138Updated last week
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆337Updated 3 months ago
- Resources for learning about Exploit Development☆397Updated 4 years ago
- ☆233Updated 2 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆66Updated 3 months ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆105Updated 2 years ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆160Updated 8 months ago
- Collection of resources for my preparation to take the OSEE certification.☆281Updated 4 years ago
- My notes on pwn☆287Updated 3 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆698Updated 8 months ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- Writeups for the challenges from DownUnderCTF 2021☆175Updated 2 years ago
- Hack-A-Sat Qualifiers Writeups☆252Updated 2 years ago
- ☆144Updated 4 months ago