几年前,我看过很多程序,即所谓的“ crack mes”。
本周当我搜索一些内容时,发现没有。
我的问题是,有人可以推荐一些网站(Crack Me演练)/学习资源以开始进行逆向工程吗?
#1 楼
这是一堆:https://www.wechall.net/active_sites
http://www.wechall.net/challs/
https: //crackmes.one
https://pwnable.xyz/
https://tuts4you.com/download.php?list.17
https://github.com/fdivrp/真棒-//
https://github.com/michalmalik/linux-re-101
https://tuts4you.com/download.php
https://github.com/ RPISEC / MBE
https://github.com/Maijin/Workshop2015/tree/master/IOLI-crackme
https://hackcenter.com/sign-in
https:// www .root-me.org / en / Challenges / Cracking /
https://challenges.re/
https://github.com/s7ephen/CSAW_2009
https:// github。 com / isislab / Hack-Night /
http://pwnable.kr/
https://w3challs.com/
http://io.netgarage.org/
http://rogerfm.net/challenge/crackme/index.htm
https://gironsec.com/cactuscon_re_challenges/index.php
https://cryptocult.wordpress.com/cyber-challenges/
http://www.reteam.org/challenges.html
https://github.com/rshipp/awesome-malware-analysis
http://crackmes.cf
https://0x00sec.org/t/challenge-collection-reverse-engineering-and-crackme/3027
http://reversing.kr/
#2 楼
https://dilsec.wordpress.com/2017/07/06/google-ctf-2017-pwnables-inst_prof-writeup/(Google CTF编写)
https://www.cs.ucsb.edu/~chris/teaching/cs290/projects/proj4.html
(请参阅挑战4)
https: //www.fireeye.com/blog/threat-research/2015/07/announcing_the_secon.html(FLARE)
https://cedricvb.be/post/reverse-engineering-the-hitb- binary-100-ctf-challenge /
(HITB)
更新:
https:// github .com / Eun / ctf.tf
https://0x00sec.org/c/reverse-engineering/challenges
http://crackmes.de/(目前离线,请参见- br />消息)
您可以在此处下载网站的存档版本(Crackmes.de(2011-2015)):https://tuts4you.com/download.php? view.3152
更新2:
https://challenges.re/
#3 楼
尽管这是一个过时的帖子,但我想添加一个长期存在但仍充满挑战的网站(有时在更高级别上会非常困难):https://overthewire.org/wargames/