0xdidu / Reverse-Engineering-Intel-x64-101Links
Material for a RE 101 class on Intel x64 binaries
☆164Updated 5 years ago
Alternatives and similar repositories for Reverse-Engineering-Intel-x64-101
Users that are interested in Reverse-Engineering-Intel-x64-101 are comparing it to the libraries listed below
Sorting:
- ☆182Updated 5 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆182Updated 6 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 5 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 10 months ago
- A thorough library database to assist with binary exploitation tasks.☆199Updated 2 years ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆158Updated 5 years ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- List of real-world threats against endpoint protection software☆216Updated 7 months ago
- A port of Kaitai to the Hiew hex editor☆150Updated 5 years ago
- INFILTRATE 2019 Demo Materials☆339Updated 2 years ago
- Vulnerability examples.☆405Updated last year
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆287Updated 7 years ago
- DrSemu - Sandboxed Malware Detection and Classification Tool Based on Dynamic Behavior☆273Updated 5 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆98Updated 8 years ago
- Fork of mona.py with x64dbg support☆104Updated 3 years ago
- r2con2019 - slides and materials☆138Updated 5 years ago
- Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con☆125Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆252Updated 4 years ago
- My repository to upload drivers from different books and all the information related to windows internals.☆156Updated 5 years ago
- Exploitation and Mitigation Slides☆127Updated last year
- Hardcore corruption of my execve() vulnerability in WSL☆215Updated 7 years ago
- ☆107Updated 6 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆294Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆148Updated 5 years ago
- Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launche…☆263Updated 3 years ago
- A portable reverse engineering environment using docker.☆208Updated 6 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago