This project is an introduction to reverse engineering.
-
Updated
Dec 17, 2023 - C
The process of analyzing a subject system to identify the system's components and their interrelationships and to create representations of the system in another form or at a higher level of abstraction.
This project is an introduction to reverse engineering.
Memory analysis functions for scanning patterns within process memory, aiding reverse engineering and malware analysis using technical terms like 'signature,' 'offset,' and 'memory read'.
A commandline tool for finding strings in binary files and the assembler code that access it. Can be used for reverse engineering binary applications.
Source code for the TM32 disassembler created by asbokid https://sourceforge.net/projects/tm32dis/
🚩 CTF challenges for the Advanced Cybersecurity Topics course
Handheld Readout Device(HRD) for Sensors. Sustainability, Reuse, Recycle.
injector csgo
QEMU Interactive Runtime Analyser
42 | Privilege escalation exercices on a system image
snow crash is an introduction to cybersecurity CTF like on a virtual machine
A write-up of my solutions to the HackMIT Admission Puzzles 2023
Miscellaneous tools for working w/ visual novel engine formats
Platform for Architecture-Neutral Dynamic Analysis
This repository contains some CTF questions I have solved
Last project of the exploit branch
A HEX editor with some cool features (work in progress)
The second in a series of four machines, each pen-tested and explained.
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
Personal collection of add-ons to `libr`.