Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation reverse engineering
exploitation
x
reverse-engineering
x
33 search results found
Awesome Hacking Resources
⭐
14,679
A collection of hacking / penetration testing resources to make you better!
Pwndbg
⭐
6,337
Exploit Development and Reverse Engineering with GDB Made Easy
Gef
⭐
6,203
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Ctf All In One
⭐
3,754
CTF竞赛权威指南
Rizin
⭐
2,290
UNIX-like reverse engineering framework and command-line toolset.
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Apple Knowledge
⭐
744
A collection of reverse engineered Apple things, as well as a machine-readable database of Apple hardware
Magisk Frida
⭐
710
🔐 Run frida-server on boot with Magisk, always up-to-date
Hyperpwn
⭐
531
A hyper plugin to provide a flexible GDB GUI frontend with the help of GEF, pwndbg or peda
Pwndra
⭐
526
A collection of pwn/CTF related utilities for Ghidra
Iblessing
⭐
438
iblessing is an iOS security exploiting toolkit, it mainly includes application information gathering, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Subaru Starlink Research
⭐
405
Subaru StarLink persistent root code execution.
Iot Pt
⭐
389
A Virtual environment for Pentesting IoT Devices
Anticheat Testing Framework
⭐
368
Framework to test any Anti-Cheat
Awesome Csirt
⭐
368
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Awesome List
⭐
365
Cybersecurity oriented awesome list
Android Security Exploits Youtube Curriculum
⭐
357
🔓A curated list of modern Android exploitation conference talks.
Exrs
⭐
354
Exercises for learning Reverse Engineering and Exploitation.
Pwnbox
⭐
303
Docker container with tools for binary reverse engineering and exploitation.
Idacyber
⭐
283
Data Visualization Plugin for IDA Pro
Injectopi
⭐
214
A set of tutorials about code injection for Windows.
Shannonre
⭐
175
Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S6
Pwnshop
⭐
144
Exploit Development, Reverse Engineering & Cryptography
Ntrghidra
⭐
140
A Nintendo DS binary loader for Ghidra
Titanm
⭐
137
This repository contains the tools we used in our research on the Google Titan M chip
Writeups
⭐
133
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Gef Extras
⭐
129
Extra goodies for GEF to (try to) make GDB suck even less
Empirectf
⭐
123
EmpireCTF – write-ups, capture the flag, cybersecurity
Shannonbaseband
⭐
119
Scripts, plugins, and information for working with Samsung's Shannon baseband.
Ctflearn Writeups
⭐
110
CTFlearn writeups of all the challenges I have solved. It covers all the domains including Cryptography, Forensics, Reversing, Pwning and other Misc problems.
Re101in20min
⭐
98
Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con
Awesome Cryptocurrency Security
⭐
89
😎 Curated list about cryptocurrency security (reverse / exploit / fuzz..)
Vac Bypass
⭐
73
Full VAC Bypass. Inject detected cheats and not get VAC banned.
Arm Episodes
⭐
68
Arm Episodes
Archive
⭐
65
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Syscalldumper
⭐
64
Dump system call codes, names, and offsets from Ntdll.dll
Samsung Trustzone Research
⭐
64
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
Rair Core
⭐
62
RAIR: RAdare In Rust
Book
⭐
59
An official book about Rizin
Override
⭐
53
Binary Exploitation and Reverse-Engineering (from assembly into C)
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Chimay Red
⭐
52
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Gohack
⭐
49
Experimental Go language CSGO exploit.
Rvdbg
⭐
47
RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, documented code base being worked on in: core branch)
Utimaco
⭐
39
Tools for reverse engineering the Utimaco Firmware
Tmohs1 Root Utility
⭐
39
An interactive python script that enables root access on the T-Mobile (Wingtech) TMOHS1, as well as providing several useful utilites to change the configuration of the device.
Writeups
⭐
33
Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools
Nightsoferised
⭐
30
Erised Reverse Engineering and Exploitation Training Sessions
Cyberqueens
⭐
29
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Symrepl
⭐
29
Symbol REPL
Battleye User Mode Bypass
⭐
27
BattlEye compatible injector, done completely from user-mode.
Om5p Ac V2 Unlocker
⭐
25
Open Mesh OM5P-AC v2 Unlocker (U-Boot 1.1.4 based)
Linksys Wrt54g
⭐
24
Exploiting Linksys WRT54G using a vulnerability I found.
Ctf Write Up
⭐
22
TEAM BAY'S CTF WRITE UP
Kali Linux Dockerfile
⭐
20
A simple Dockerfile to build an image starting from the latest official one of Kali Linux and including some useful tools.
Bfs2019
⭐
20
Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
Reverse Engineering
⭐
20
Reverse Engineering tools
C Experiments
⭐
18
Experiments on C/C++ Exploits
Gomem
⭐
17
A Go library for manipulating Windows processes.
Xsymlink
⭐
16
Xbox One Symbolic Link Exploit: Access restricted/encrypted volumes using the Xbox File Explorer.
R2con Prequals Rhme3
⭐
16
r2 the Rhme3! The RHme (Riscure Hack me) is a low level hardware CTF that comes in the form of an Arduino board (AVR architecture). It involves a set of SW and HW challenges to test your skills in different areas such as side channel analysis, fault injection, reverse-engineering and software exploitation. In our talk we will briefly recap RHme2 and introduce the upcoming RHme3. This year we decided to create a special target called the Riscurino board which features CAN controllers for a real a
Windows Binary Exploitation
⭐
11
Resources from my journey into Windows binary exploitation
Gef Legacy
⭐
10
Legacy version of GEF running for GDB+Python2
Ctf Solve
⭐
10
Sunshinectf 2019 Public
⭐
10
Repository of challenges for SunshineCTF 2019
Flame Sourcecode
⭐
9
Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.
Rainfall
⭐
9
Binary Exploitation and Reverse-Engineering (from assembly into C)
Exploitation_docker
⭐
8
Docker container with exploitation technique examples, used in my master thesis
Uokoo_exploit
⭐
8
Post-Auth RCE & Persistence on UOKOO Security Cameras
Reverse_engineering
⭐
8
In here you can find a random collection binaries from challenges, forums, ctfs meant to be reverse engineered.
Exploit Development And Pentesting
⭐
7
My notes, exercises, and reports on reverse engineering and penetrating applications
Shadow Shell
⭐
6
Cyber lab to explore different memory exploits and to analyze malware
Jafe
⭐
5
Just Another Fifa Exploit: Unsigned code execution for FIFA Soccer 06 (USA) for the NDS
Blog
⭐
5
https://strm.sh website source code
Related Searches
Python Exploitation (1,616)
Exploitation Cve (771)
Python Reverse Engineering (631)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Exploitation Penetration Testing (353)
1-33 of 33 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.