ujjwal-kr / brainf
Making a brainf*ck compiler in 24 hours
☆13Updated 2 years ago
Alternatives and similar repositories for brainf:
Users that are interested in brainf are comparing it to the libraries listed below
- List of resources for aspiring contributors related to technologies we use here at hackarmour☆11Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated last year
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Updated 2 years ago
- Persistence techniques for windows.☆19Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- ☆33Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- A stack based programming language written in rust☆29Updated last year
- Reverse text segment x64 ELF infector written in Assembly☆20Updated 3 years ago
- A repository contains all sort of cheat-sheets for various things.☆10Updated 3 years ago
- ☆15Updated last year
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Updated last year
- ☆64Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated last year
- ☆49Updated 6 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆31Updated last year
- Slides about HyperDbg☆30Updated this week
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆38Updated last year
- Understanding some of the Anti-Reversing Techniques☆12Updated 5 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆19Updated this week
- Python TCP server for terminal rickrolls☆11Updated 3 years ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- yet another hidden LKM hunter☆21Updated last year
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- Notes template for Offensive Security's EXP-301 course and OSED exam☆17Updated 3 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆72Updated last year
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago