xairy / ubuntu-hardening
☆73Updated this week
Related projects: ⓘ
- a radare2 plugin that decodes packets with Scapy☆33Updated 6 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆38Updated 7 years ago
- GrSecurity and PaX Patches Before End of Public Release☆64Updated 6 years ago
- Copy of the contents at phrack.com☆34Updated 3 weeks ago
- Radare 2 wiki☆90Updated 4 years ago
- CTF Finals☆17Updated 6 years ago
- ☆108Updated this week
- Practice and learning in the world of C RE and exploit analysis☆31Updated 6 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆50Updated 6 years ago
- All related files and slides for past talks☆44Updated last year
- ☆33Updated this week
- ☆18Updated this week
- CTF Writeups☆23Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆66Updated 5 years ago
- An example rootkit that gives a userland process root permissions☆74Updated 4 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- SIGSTOPing ELF binaries since 0x7E1☆50Updated last month
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- ☆134Updated this week
- Example code from "Programming Linux Anti-Reversing Techniques"☆96Updated 7 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 5 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆70Updated 8 years ago
- Some kernel exploits☆142Updated 6 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆151Updated 5 years ago