tmpout / ResourcesLinks
☆22Updated 2 years ago
Alternatives and similar repositories for Resources
Users that are interested in Resources are comparing it to the libraries listed below
Sorting:
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Binary Golf Grand Prix☆84Updated last month
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 6 months ago
- Binary Golf Library☆61Updated 4 years ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆84Updated 6 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year
- yet another hidden LKM hunter☆29Updated 4 months ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Updated 5 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- DEbian Cve REproducer Tool☆27Updated 3 weeks ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆22Updated 3 years ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆48Updated last week
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆23Updated 2 years ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 3 months ago
- Cheat sheet of binary protections flags☆24Updated 5 years ago
- In-Memory Rootkit For Linux and BSD☆87Updated 5 months ago
- ☆64Updated last year
- ☆57Updated last year
- ☆55Updated last year
- ☆35Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Updated 11 months ago
- ☆89Updated 11 months ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 5 months ago
- Reverse Engineering 101 training from our Vulnerability Researcher Development Program (VRDP)☆60Updated 3 weeks ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆72Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated last year