shichao-an / hacking
Hacking: The Art of Exploitation, 2nd Edition
☆24Updated 11 years ago
Alternatives and similar repositories for hacking:
Users that are interested in hacking are comparing it to the libraries listed below
- x86 Assembly Adventures code snippets☆119Updated 6 years ago
- Source code from Hacking: The Art of Exploitation (Second Edition).☆422Updated last year
- Intro to radare2 presentation files.☆84Updated 6 years ago
- My OS study following Broken Thorn OS series: http://www.brokenthorn.com/Resources/OSDevIndex.html☆60Updated 8 years ago
- Published by Packt☆52Updated 2 years ago
- This is an example buffer overflow attack on a small vulnerable C program.☆79Updated 8 years ago
- Kernel Hacking study materials collection☆107Updated 8 years ago
- My OS Stuff :)☆37Updated 9 years ago
- Assembly Language Adventures exercises for Yasm on Linux☆93Updated last year
- Just another (unfinished) kernel from scratch...☆45Updated 3 years ago
- Snippets from ARM assembly tutorials☆114Updated 7 years ago
- Collection of articles about realmode 16bit assembly☆63Updated last year
- Exercises for Assembly language course☆336Updated 2 years ago
- Mastering Reverse Engineering, published by Packt☆148Updated 2 years ago
- shellcoderhandbook source code : "The Shellcoder's Handbook: Discovering and Exploiting Security Holes"☆73Updated 11 years ago
- Lewis & Clark CCDC Team Resources☆16Updated 9 years ago
- Spectre exploit☆55Updated 7 years ago
- Papers about known hacking, security, hardware, software, computer, network and other ressources.☆76Updated 5 years ago
- A collection of some interesting network security projects☆57Updated 6 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆168Updated 5 years ago
- Malware Analyst's Cookbook stuffs☆154Updated 9 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆26Updated 8 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- Have fun!☆30Updated 7 years ago
- After attackers manage to gain access to a remote (or local) machine and elevate their privileges to "root", they typically want to maint…☆35Updated 8 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆21Updated 10 years ago
- Tiniest ELF (Executable and Linkable Format) executable☆13Updated 6 years ago