zxgio / gdb-cheatsheetView external linksLinks
GDB cheatsheet for reversing binaries
☆21Jan 25, 2019Updated 7 years ago
Alternatives and similar repositories for gdb-cheatsheet
Users that are interested in gdb-cheatsheet are comparing it to the libraries listed below
Sorting:
- Radare2 cheat-sheet☆113Nov 15, 2018Updated 7 years ago
- GDB + GEF cheatsheet for reversing binaries☆74Sep 24, 2023Updated 2 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 4 months ago
- A VM for RE and Pwn☆25May 17, 2024Updated last year
- A robust, open-source physical layer implementation for FPGA-to-FPGA communication over high-speed serial links of the Quantum Error Corr…☆26Updated this week
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- SD card reader with STM32F1☆11Nov 10, 2018Updated 7 years ago
- Angstrom repository with updated layers file☆11Jul 9, 2021Updated 4 years ago
- Single-axis solar position tracking prototype with a Cortex M0 MCU (Ardunio MKRZero)☆13Apr 13, 2020Updated 5 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Virtual service to help secure IoT devices☆12Aug 17, 2017Updated 8 years ago
- A soft SPI library for STM32 HAL.☆11Oct 15, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- An end-to-end management tool for very large computing environments, physical and virtual. it collects alarms and detailed statistics fro…☆16Apr 7, 2023Updated 2 years ago
- This is a demo of how to read a string from an Arduino serially with C in a Unix environment☆12Jul 3, 2012Updated 13 years ago
- Tourmaline is a AOT programming language with LLVM☆12Aug 21, 2017Updated 8 years ago
- x86 emulator with DOS [unofficial mirror]☆12Oct 13, 2025Updated 4 months ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- A python class for the use of the MLX90640 Thermal Camera☆15Jun 21, 2022Updated 3 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Instrospect function signatures to construct a CLI☆16Apr 16, 2021Updated 4 years ago
- Microbrowser for Microcontroller☆12Aug 2, 2020Updated 5 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- The NowSecure Mobile Security Report☆11Nov 16, 2016Updated 9 years ago
- KiCad RF Stuff☆14Aug 17, 2021Updated 4 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- Compiler Fingerprinting☆14Apr 24, 2015Updated 10 years ago
- BitBender is a byte manipulation tool☆12Mar 2, 2018Updated 7 years ago
- ☆12Sep 7, 2014Updated 11 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- ☆11Mar 9, 2018Updated 7 years ago