zxgio / gdb-cheatsheetLinks
GDB cheatsheet for reversing binaries
☆21Updated 6 years ago
Alternatives and similar repositories for gdb-cheatsheet
Users that are interested in gdb-cheatsheet are comparing it to the libraries listed below
Sorting:
- ☆49Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆57Updated last year
- Routines for hunting down kernel symbols.☆83Updated 14 years ago
- Gdb Extension Framework is a bunch of python code around the gdb api.☆51Updated 4 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Updated 10 years ago
- Library for creating CTF services.☆75Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 8 years ago
- Simple shellcode decoder using unicorn-engine☆99Updated 10 years ago
- ☆23Updated 6 years ago
- Radare2 cheat-sheet☆113Updated 7 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Small script to determine valid immediate values for ARM assembly☆19Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- GDB + GEF cheatsheet for reversing binaries☆74Updated 2 years ago
- Routines for hunting down kernel structs.☆41Updated 14 years ago
- Attacking the Core associated source files☆89Updated 8 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Updated 4 years ago
- r2con 2017 September 6-9☆97Updated 8 years ago
- Exploit Development and Reverse Engineering with GDB Made Easy☆39Updated 6 years ago
- CTF writeups☆13Updated 8 years ago
- Arm Episodes☆78Updated 7 years ago
- Python repository containing parsed standard C library function and argument information☆28Updated 7 years ago
- ☆26Updated 7 years ago
- ☆26Updated last month
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Binary Ninja Posters☆35Updated 5 years ago
- POLAR☆74Updated 6 years ago
- Memory forensics of virtualization environments☆48Updated 11 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆66Updated 10 years ago