Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation reverse engineering
exploitation
x
reverse-engineering
x
24 search results found
Awesome Hacking Resources
⭐
14,679
A collection of hacking / penetration testing resources to make you better!
Pwndbg
⭐
6,337
Exploit Development and Reverse Engineering with GDB Made Easy
Gef
⭐
6,203
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Ctf All In One
⭐
3,754
CTF竞赛权威指南
Rizin
⭐
2,290
UNIX-like reverse engineering framework and command-line toolset.
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Apple Knowledge
⭐
744
A collection of reverse engineered Apple things, as well as a machine-readable database of Apple hardware
Magisk Frida
⭐
710
🔐 Run frida-server on boot with Magisk, always up-to-date
Pwndra
⭐
526
A collection of pwn/CTF related utilities for Ghidra
Iblessing
⭐
438
iblessing is an iOS security exploiting toolkit, it mainly includes application information gathering, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Subaru Starlink Research
⭐
405
Subaru StarLink persistent root code execution.
Iot Pt
⭐
389
A Virtual environment for Pentesting IoT Devices
Awesome Csirt
⭐
368
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Anticheat Testing Framework
⭐
368
Framework to test any Anti-Cheat
Awesome List
⭐
365
Cybersecurity oriented awesome list
Android Security Exploits Youtube Curriculum
⭐
357
🔓A curated list of modern Android exploitation conference talks.
Exrs
⭐
354
Exercises for learning Reverse Engineering and Exploitation.
Pwnbox
⭐
303
Docker container with tools for binary reverse engineering and exploitation.
Injectopi
⭐
214
A set of tutorials about code injection for Windows.
Pwnshop
⭐
144
Exploit Development, Reverse Engineering & Cryptography
Titanm
⭐
137
This repository contains the tools we used in our research on the Google Titan M chip
Writeups
⭐
133
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Gef Extras
⭐
129
Extra goodies for GEF to (try to) make GDB suck even less
Empirectf
⭐
123
EmpireCTF – write-ups, capture the flag, cybersecurity
Shannonbaseband
⭐
119
Scripts, plugins, and information for working with Samsung's Shannon baseband.
Ctflearn Writeups
⭐
110
CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and other Misc problems.
Awesome Cryptocurrency Security
⭐
89
😎 Curated list about cryptocurrency security (reverse / exploit / fuzz..)
Vac Bypass
⭐
73
Full VAC Bypass. Inject detected cheats and not get VAC banned.
Arm Episodes
⭐
68
Arm Episodes
Archive
⭐
65
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Syscalldumper
⭐
64
Dump system call codes, names, and offsets from Ntdll.dll
Rair Core
⭐
62
RAIR: RAdare In Rust
Override
⭐
53
Binary Exploitation and Reverse-Engineering (from assembly into C)
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Rvdbg
⭐
47
RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, documented code base being worked on in: core branch)
Tmohs1 Root Utility
⭐
39
An interactive python script that enables root access on the T-Mobile (Wingtech) TMOHS1, as well as providing several useful utilites to change the configuration of the device.
Utimaco
⭐
39
Tools for reverse engineering the Utimaco Firmware
Writeups
⭐
33
Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools
Cyberqueens
⭐
29
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Battleye User Mode Bypass
⭐
27
BattlEye compatible injector, done completely from user-mode.
Linksys Wrt54g
⭐
24
Exploiting Linksys WRT54G using a vulnerability I found.
Ctf Write Up
⭐
22
TEAM BAY'S CTF WRITE UP
Bfs2019
⭐
20
Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
Kali Linux Dockerfile
⭐
20
A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.
C Experiments
⭐
18
Experiments on C/C++ Exploits
Gomem
⭐
17
A Go library for manipulating Windows processes.
Windows Binary Exploitation
⭐
11
Resources from my journey into Windows binary exploitation
Ctf Solve
⭐
10
Sunshinectf 2019 Public
⭐
10
Repository of challenges for SunshineCTF 2019
Gef Legacy
⭐
10
Legacy version of GEF running for GDB+Python2
Flame Sourcecode
⭐
9
Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.
Rainfall
⭐
9
Binary Exploitation and Reverse-Engineering (from assembly into C)
Exploitation_docker
⭐
8
Docker container with exploitation technique examples, used in my master thesis
Uokoo_exploit
⭐
8
Post-Auth RCE & Persistence on UOKOO Security Cameras
Exploit Development And Pentesting
⭐
7
My notes, exercises, and reports on reverse engineering and penetrating applications
Related Searches
Python Exploitation (1,616)
Exploitation Cve (771)
Python Reverse Engineering (631)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Exploitation Penetration Testing (353)
1-24 of 24 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.