tmpout / ResourcesLinks
☆22Updated 2 years ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below
Sorting:
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- Binary Golf Grand Prix☆84Updated last month
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆84Updated 6 months ago
- A collection of my reverse engineering and malware analysis write-ups☆21Updated 5 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- ☆57Updated last year
- ☆64Updated last year
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- DEbian Cve REproducer Tool☆27Updated last month
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Binary Golf Library☆61Updated 4 years ago
- Cheat sheet of binary protections flags☆24Updated 5 years ago
- ☆18Updated 5 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆94Updated 3 months ago
- ☆39Updated 2 years ago
- yet another hidden LKM hunter☆29Updated 4 months ago
- French old computer security ezines restored to serve as mirrors. The sources have been slightly tweaked for immediate use.☆72Updated 3 months ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated 2 years ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Still point in moving world.☆49Updated 3 years ago
- ☆89Updated 11 months ago
- ☆81Updated 8 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Updated 11 months ago
- Linux process injection PoCs☆29Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago