shichao-an / hacking
Hacking: The Art of Exploitation, 2nd Edition
☆24Updated 11 years ago
Alternatives and similar repositories for hacking:
Users that are interested in hacking are comparing it to the libraries listed below
- Snippets from ARM assembly tutorials☆114Updated 7 years ago
- Collection of Linux shellcodes☆71Updated 8 years ago
- x86 Assembly Adventures code snippets☆119Updated 6 years ago
- 64KB and smaller demoscene intros. Sorted by size. hardcode.untergrund.net☆39Updated 5 years ago
- Intro to x86 Assembly Language.☆270Updated 4 years ago
- Create shellcode from executable or assembly code☆12Updated 7 years ago
- Kernel Hacking study materials collection☆110Updated 8 years ago
- Exercises for Assembly language course☆336Updated 2 years ago
- My OS study following Broken Thorn OS series: http://www.brokenthorn.com/Resources/OSDevIndex.html☆60Updated 9 years ago
- Dump sections or program entries from a ELF file☆21Updated 9 years ago
- arp-poison (aka arp spoof) tool☆38Updated 11 years ago
- simple shellcode generator☆112Updated 8 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆26Updated 9 years ago
- Intro to radare2 presentation files.☆84Updated 7 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆67Updated 7 years ago
- Published by Packt☆53Updated 2 years ago
- Spectre exploit☆55Updated 7 years ago
- Collection of articles about realmode 16bit assembly☆64Updated last year
- Phoenix☆45Updated 6 years ago
- Fully functional but simplified Linux Kernel Module (LKM) Rootkit for educational purposes☆60Updated 5 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- After attackers manage to gain access to a remote (or local) machine and elevate their privileges to "root", they typically want to maint…☆35Updated 8 years ago
- My OS Stuff :)☆37Updated 9 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- This repository is a hands-on tutorial which aims at going through dissection and analysis of arbitrary binaries.☆49Updated 4 years ago
- Tiniest ELF (Executable and Linkable Format) executable☆14Updated 6 years ago
- This is an example buffer overflow attack on a small vulnerable C program.☆78Updated 8 years ago
- Scapy Presentation and Code☆28Updated 9 years ago