shichao-an / hacking
Hacking: The Art of Exploitation, 2nd Edition
☆24Updated 11 years ago
Alternatives and similar repositories for hacking:
Users that are interested in hacking are comparing it to the libraries listed below
- x86 Assembly Adventures code snippets☆118Updated 6 years ago
- This is an example buffer overflow attack on a small vulnerable C program.☆78Updated 8 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆68Updated 7 years ago
- Published by Packt☆53Updated 2 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆52Updated 8 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆170Updated 12 years ago
- Collection of Linux shellcodes☆71Updated 8 years ago
- Read more: https://www.nu11secur1ty.com/search?q=Kernel video: https://www.nu11secur1ty.com/2017/04/l1nur00tk1tw1ngcun-26x3x4x-zero-days.…☆34Updated last year
- PC Assembly language book☆164Updated 2 years ago
- Binary Analysis Cookbook, published by Packt☆42Updated 2 years ago
- Kernel Hacking study materials collection☆110Updated 8 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- Exercises for Assembly language course☆342Updated 2 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Snippets from ARM assembly tutorials☆114Updated 7 years ago
- VoidHack CTF write-ups☆59Updated 6 years ago
- My OS Stuff :)☆37Updated 9 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Reversing list☆149Updated last year
- Some Reverse Engineering Tutorials for Beginners☆260Updated 2 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆275Updated 4 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆43Updated 8 years ago
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.☆80Updated last year
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆158Updated 6 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Writeup for picoCTF 2018☆126Updated 3 years ago
- Devestating and awesome Linux X86_64 ELF Virus☆227Updated 2 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆86Updated 6 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆170Updated 5 years ago