shichao-an / hacking
Hacking: The Art of Exploitation, 2nd Edition
☆24Updated 10 years ago
Related projects: ⓘ
- ☆67Updated this week
- x86 Assembly Adventures code snippets☆116Updated 6 years ago
- Kernel Hacking study materials collection☆105Updated 8 years ago
- Published by Packt☆49Updated last year
- Collection of Linux shellcodes☆70Updated 8 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆52Updated 7 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆80Updated 3 years ago
- Mastering Reverse Engineering, published by Packt☆145Updated last year
- Malware Analyst's Cookbook stuffs☆150Updated 8 years ago
- Reverse engineering challenges☆50Updated 4 years ago
- This is an example buffer overflow attack on a small vulnerable C program.☆78Updated 8 years ago
- PC Assembly language book☆160Updated last year
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 7 years ago
- ☆22Updated 7 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆66Updated 6 years ago
- simple shellcode generator☆111Updated 7 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆158Updated 11 years ago
- ☆25Updated 6 years ago
- Assembly Language Adventures exercises for Yasm on Linux☆90Updated last year
- Exercises for Assembly language course☆327Updated last year
- Collection of articles about realmode 16bit assembly☆59Updated last year
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆93Updated 6 years ago
- ☆38Updated this week
- Phoenix☆39Updated 5 years ago
- shellcoderhandbook source code : "The Shellcoder's Handbook: Discovering and Exploiting Security Holes"☆71Updated 10 years ago
- CLI tool to analyze PE files☆83Updated last year
- Solutions to a variety of Capture The Flag challenges from different competitions.☆204Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆83Updated 3 years ago
- Malquarium - Modern Malware Repository☆47Updated 4 years ago