An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
-
Updated
Oct 18, 2024 - C++
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
A collection of hacking / penetration testing resources to make you better!
CTF framework and exploit development library
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
A curated list of CTF frameworks, libraries, resources and softwares
Exploit Development and Reverse Engineering with GDB Made Easy
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Course materials for Modern Binary Exploitation by RPISEC
ffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Monitor linux processes without root permissions
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Automatic SSRF fuzzer and exploitation tool
Add a description, image, and links to the ctf topic page so that developers can more easily learn about it.
To associate your repository with the ctf topic, visit your repo's landing page and select "manage topics."