tmpout / ResourcesLinks
☆19Updated 2 years ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below
Sorting:
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Binary Golf Grand Prix☆74Updated 2 weeks ago
- Cheat sheet to detect and remove linux kernel rootkit☆74Updated 11 months ago
- Binary Golf Library☆61Updated 4 years ago
- DEbian Cve REproducer Tool☆27Updated 3 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆82Updated 3 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 3 months ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆137Updated 2 months ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆21Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- yet another hidden LKM hunter☆30Updated 2 months ago
- Cheat sheet of binary protections flags☆25Updated 5 years ago
- ☆82Updated 8 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- ☆64Updated last year
- Binary Golf Grand Prix☆115Updated 2 years ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆45Updated 3 months ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- Still point in moving world.☆49Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆121Updated 3 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆47Updated 7 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆122Updated last year
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 3 years ago
- Binary Exploitation Phrack CTF Challenge☆69Updated 2 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago
- ☆55Updated last year