There are 35 repositories under binary-exploitation topic.
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures.
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
An in depth tutorial on how to do binary exploitation
ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together
List of CyberSecurity Resources and some different Sub-Domains of CyberSecurity
台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse engineers, and low-level programmers.
Solutions (that we managed to find) for the 2021 PicoCTF
List of tools and commands that may be helpful in CTFs
Learn Binary Exploitation with sample problems and solutions
Stop Learning, Start Hacking
AutoGDB: First Automatic Binary-exploitation Tool combining ML ReACT Reasoning and GDB Dynamic Debugging
A curated list of awesome infosec blog posts, courses, books and more!
Stash for Binary Exploitation and Reverse Engineering Resources
Very simple script(s) to hasten binary exploit creation
Articles and tools related to research in the Apple environment (mainly macOS).
Writeup of a remote code execution in Factorio by supplying a modified save file.
My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.
Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.
Good to know, easy to forget information about binaries and their exploitation!
🎵 Official source code and writeups for SekaiCTF 2024!
This repository is a hands-on tutorial which aims at going through dissection and analysis of arbitrary binaries.
Reverse Engineering and Malware Analysis Roadmap
:books: Yet another CTF writeups repository. PWN and RE tasks
This repository has everything I have learnt so far while reading the book Practical Malware Analysis
Write up of solutions to the picoCTF 2023 capture the flag (CTF) event from my submissions during the competition.
Notes, research, and methodologies for becoming a better hacker. Knowledge should be free.
Hacking training websites list and tutorials