You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A comprehensive collection of cheatsheets for reverse engineering, binary analysis, and assembly programming tools. This repository serves as a one-stop reference for security researchers, reverse engineers, and low-level programmers.
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
Securinator will streamline Network Administrationby saving time issuing commands by outputing time consuming commands to a TXT file and then displaying the results in a Command Prompt to avoid having to use long commands repededly. Securinator is good for compairing system and file properties aswell as seeking seeking out malware manually and …