There are 37 repositories under binary-exploitation topic.
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures.
CTF challenge (mostly pwn) files, scripts etc
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse engineers, and low-level programmers.
List of CyberSecurity Resources and some different Sub-Domains of CyberSecurity
Reverse Engineering and Malware Analysis Roadmap
An in depth tutorial on how to do binary exploitation
An online assembly editor, emulator and debugger for the x86-64 architecture
台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
List of tools and commands that may be helpful in CTFs
Articles and tools related to research in the Apple environment (mainly macOS).
Learn Binary Exploitation with sample problems and solutions
Solutions (that we managed to find) for the 2021 PicoCTF
My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.
Stop Learning, Start Hacking
🎵 Official source code and writeups for SekaiCTF 2025!
Stash for Binary Exploitation and Reverse Engineering Resources
A curated list of awesome infosec blog posts, courses, books and more!
Very simple script(s) to hasten binary exploit creation
Writeup of a remote code execution in Factorio by supplying a modified save file.
🎵 Official source code and writeups for SekaiCTF 2024!
Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.
Good to know, easy to forget information about binaries and their exploitation!
This repository is a hands-on tutorial which aims at going through dissection and analysis of arbitrary binaries.
Notes, research, and methodologies for becoming a better hacker. Knowledge should be free.
:books: Yet another CTF writeups repository. PWN and RE tasks
This repository has everything I have learnt so far while reading the book Practical Malware Analysis