Solutions to reverse engineering challenges from crackmes.one
-
Updated
Jun 28, 2024 - C
Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission.
Solutions to reverse engineering challenges from crackmes.one
NONOSDK precompiled library with patched ieee80211_freedom_output function
Driver 2 Playstation game reverse engineering effort
Over Ride is a CTF like challenge about exploiting ELF32 & ELF64 binaries on x86_64 architecture
CS-412 Software Security EPFL course labs of Spring 2023 edition
ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.
This project is an introduction to reverse engineering.
Understanding the inner mechanics of Lunii StoryTeller. Using Ghidra to reverse engineer the STM32 firmwares and cryptography
Toolkit for debugging Samsung baseband firmware
Contains utilities to make it easier to work with the Open Watcom compiler in Ghidra
My Ghidra data type archive repository
Reverse engineering a game by binary patching the game so that it can open multiple instances
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
A collection of Ghidra Data Type (GDT) archives and combined C headers from common libraries with modifications to facilitate importing into Ghidra via the "Parse C Source..." mechanism. Contributions are welcome (and encouraged)
Attempting to fully reverse Soul Reaver PSX game using Ghidra, TDR and PsyX.
Practical P-Code examples
Created by National Security Agency
Released March 5, 2019
Latest release 15 days ago