Tools: Vulnerable: Reverse Engineering

This commit is contained in:
pe3zx 2018-07-26 10:54:11 +00:00
parent b5fa2800c7
commit e18e674c80

View File

@ -2130,6 +2130,10 @@ This repository lists most of the challenges used in the Google CTF 2017. The mi
<td><a href="https://github.com/rapid7/hackazon">rapid7/hackazon</a></td>
<td>A modern vulnerable web app</td>
</tr>
<tr>
<td><a href="https://martin.uy/blog/projects/reverse-engineering/">Reverse Engineering</a></td>
<td>Welcome to the Reverse Engineering open course! This course is a journey into executable binaries and operating systems from 3 different angles: 1) Malware analysis, 2) Bug hunting and 3) Exploit writing. Both Windows and Linux x86/x86_64 platforms are under scope.</td>
</tr>
<tr>
<td><a href="https://github.com/sagishahar/lpeworkshop">sagishahar/lpeworkshop</a></td>
<td>Windows / Linux Local Privilege Escalation Workshop</td>