xorpd / asm_prog_exLinks
Exercises for Assembly language course
☆350Updated 3 years ago
Alternatives and similar repositories for asm_prog_ex
Users that are interested in asm_prog_ex are comparing it to the libraries listed below
Sorting:
- x86 Assembly Adventures code snippets☆120Updated 7 years ago
- Assembly Language Adventures exercises for Yasm on Linux☆97Updated 2 years ago
- Intro to x86 Assembly Language.☆287Updated 5 years ago
- Intro to radare2 presentation files.☆83Updated 7 years ago
- ☆352Updated 10 years ago
- PC Assembly language book☆181Updated 8 months ago
- Reverse Engineering using Radare2☆338Updated 4 years ago
- mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/☆277Updated 5 years ago
- A simple guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS....☆970Updated 7 years ago
- Challenges for Binary Exploitation Workshop☆631Updated 3 years ago
- Open and censorship resistant crackmes repository☆129Updated 6 years ago
- Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work …☆294Updated 8 years ago
- Learn 16bit x86 Assembly with emulator☆418Updated last year
- Some CrackMe codes for Linux x86/x86_64☆391Updated 2 years ago
- Material for the YouTube series☆513Updated 3 years ago
- documentations, slides decks...☆823Updated last year
- This project was put together to teach myself NASM x86 assembly language on linux.☆713Updated 10 months ago
- MOVED TO: https://cirosantilli.com/linux-kernel-module-cheat/userland-assembly with code at https://github.com/cirosantilli/linux-kernel-…☆890Updated 6 years ago
- Vxheaven.org website's mirror☆178Updated 7 years ago
- An in depth tutorial on how to do binary exploitation☆455Updated 7 years ago
- Collection of Linux shellcodes☆72Updated 9 years ago
- Some Reverse Engineering Tutorials for Beginners☆271Updated 2 years ago
- Mastering Reverse Engineering, published by Packt☆169Updated 3 years ago
- Reverse engineering basics in puzzle form☆183Updated 5 years ago
- Source code from Hacking: The Art of Exploitation (Second Edition).☆451Updated 2 years ago
- JynxKit2 is an LD_PRELOAD userland rootkit based on the original JynxKit. The backdoor has been replaced with an "accept()" system hook.☆181Updated 13 years ago
- Interactive Redundant Assembler (shell)☆96Updated 6 years ago
- x86 and amd64 instruction reference manual pages☆267Updated 5 years ago
- ☆182Updated 6 years ago
- Exercises for learning Reverse Engineering and Exploitation.☆388Updated 6 years ago