vxsparsh / re-resources
A systematic roadmap and collection of resources for reverse engineering
☆16Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for re-resources
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆95Updated last year
- Reverse Engineering and Malware Analysis Roadmap☆45Updated 3 months ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12Updated 3 years ago
- Gonna share my writeups and resources here☆57Updated last year
- ☆23Updated 2 years ago
- ☆64Updated 3 years ago
- TryHackMe Koth - Shell vs Shell techniques☆29Updated 2 years ago
- A collection of my adventures through hackthebox.eu☆27Updated 3 years ago
- My Collection of exploits, reverse shells, scripts and more☆12Updated last year
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆46Updated last year
- Solutions to some crackmes that I have done.☆60Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆69Updated 7 years ago
- This is a simple process injection made in C for Linux systems☆22Updated last year
- Notes template for Offensive Security's EXP-301 course and OSED exam☆14Updated 2 years ago
- ☆75Updated 3 years ago
- Full exploit chain for Faronics-DeepFreeze-8☆3Updated last year
- Just another collection of links, tools, reports and other stuff☆20Updated 3 years ago
- Stack Based buffer overflow attack☆18Updated 11 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated 3 months ago
- little helping scripts that I use daily☆11Updated 3 years ago
- Malware Analysis Tools☆29Updated 5 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- Templates for submissions☆56Updated 11 months ago
- Command line client for HackTheBox☆21Updated 8 months ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆15Updated last year
- A reverse shell for Windows and Linux written in C.☆60Updated 2 years ago
- Reverse Engineering challenges☆26Updated 3 years ago
- ☆33Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆13Updated 2 years ago