stong / flare-on-2024-writeups
Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge
☆57Updated last month
Alternatives and similar repositories for flare-on-2024-writeups:
Users that are interested in flare-on-2024-writeups are comparing it to the libraries listed below
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 9 months ago
- ☆34Updated last month
- examples of using radius2 to solve reversing challenges☆34Updated 3 weeks ago
- ☆70Updated 7 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆71Updated 4 months ago
- Binary Golf Grand Prix☆49Updated this week
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated 4 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆114Updated 2 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆59Updated last year
- Some of my windows kernel exploits for learning purposes☆121Updated 2 years ago
- Get information about stripped rust executables☆24Updated 3 weeks ago
- Writeups for CTF challenges☆30Updated last year
- ☆71Updated 6 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 3 weeks ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated 8 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆61Updated 6 months ago
- ☆63Updated 11 months ago
- ☆105Updated 6 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆68Updated 3 weeks ago
- Resolve symbols from release rust binaries on Windows☆19Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆112Updated 8 months ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆80Updated 2 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆89Updated 3 months ago
- Rust symbol recovery tool☆37Updated 6 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 6 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆95Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆136Updated 2 months ago
- Report and exploit of CVE-2023-36427☆89Updated last year
- ☆49Updated 3 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆119Updated 9 months ago