Exercises for learning Reverse Engineering and Exploitation.
☆388Mar 1, 2019Updated 7 years ago
Alternatives and similar repositories for exrs
Users that are interested in exrs are comparing it to the libraries listed below
Sorting:
- ☆351Sep 4, 2015Updated 10 years ago
- Visualization of heap operations.☆617Dec 5, 2024Updated last year
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- A collection of resources for linux reverse engineering☆2,069Jun 2, 2022Updated 3 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- The 'exploitable' GDB plugin☆747Aug 13, 2022Updated 3 years ago
- Abstract Binary Format Manipulation - ELF, PE and Mach-O format☆119Aug 20, 2015Updated 10 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)☆512May 1, 2021Updated 4 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2015☆2,000Aug 27, 2022Updated 3 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- Challenges for Binary Exploitation Workshop☆630Oct 2, 2022Updated 3 years ago
- Survey of program analysis research with a focus on machine code☆565Sep 8, 2020Updated 5 years ago
- Python scripts for reverse engineering.☆188May 7, 2021Updated 4 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- Simple ways to 0wn simple IOT devices☆65Mar 27, 2015Updated 10 years ago
- Tools for encrypting and decrypting things using Cisco's type 7 encryption.☆15Jan 11, 2013Updated 13 years ago
- Some helpful preload libraries for pwning stuff.☆1,646May 22, 2025Updated 9 months ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Gdb Extension Framework is a bunch of python code around the gdb api.☆50Jun 12, 2021Updated 4 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- 2016 DEF CON Qualifier Challenges☆178May 23, 2016Updated 9 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Teach you a binary exploitation for great good.☆294Sep 26, 2018Updated 7 years ago
- A kernel driver to practice writing exploits against, as well as some example exploits using public techniques.☆408Nov 17, 2014Updated 11 years ago
- random brain dumps☆350Jul 17, 2017Updated 8 years ago
- Files from my DEFCON CTF VM.☆273Sep 6, 2016Updated 9 years ago
- add symbols back into a stripped ELF binary (~strip)☆177Aug 8, 2017Updated 8 years ago