CTF
Learn Binary Exploitation with sample problems and solutions
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper us…
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Platform for emulation and dynamic analysis of Linux-based firmware
radius2 is a fast binary emulation and symbolic execution framework using radare2
Hex Viewer/Editor/Analyzer compatible with Linux/Windows/MacOS
Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection
NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.
Course materials for Modern Binary Exploitation by RPISEC
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing K…
CTF framework and exploit development library
Methodology, links, tools for OSINT in different countries
List of tools and commands that may be helpful in CTFs
Repository for the book "Crafting Interpreters"
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites

