7etsuo / branch-tables-and-jump-tablesLinks
This repo covers Branch and Jump Tables in C and x86 assembly. Branch Tables handle jumps within a subroutine, while Jump Tables facilitate dynamic subroutine calls. Examples and step-by-step explanations are provided for a deeper understanding.
☆10Updated 2 years ago
Alternatives and similar repositories for branch-tables-and-jump-tables
Users that are interested in branch-tables-and-jump-tables are comparing it to the libraries listed below
Sorting:
- Ghidra plugin for HashDB☆21Updated 2 years ago
- Web based binary analysis☆88Updated last year
- Identify and extract files from container formats using unblob.☆26Updated last year
- CLI program to calculate the entropy of files☆74Updated last month
- Code snippets for Reverse engineering training for xtraining platform☆34Updated 3 years ago
- Binary Golf Grand Prix☆84Updated 3 weeks ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- Webpage for a wealth of learning for many things Windows NT visit: https://empyreal96.github.io/nt-info-depot/index.html☆121Updated 5 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆125Updated 6 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- Binary Golf Examples and Resources☆258Updated 3 months ago
- A python library to parse OneNote (.one) files☆141Updated last year
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆170Updated last week
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Updated 6 months ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆185Updated 2 years ago
- ☆89Updated 11 months ago
- Research notes☆130Updated last year
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- Binary Golf Grand Prix☆116Updated 2 years ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 3 years ago
- yxd - Yuu's heX Dumper☆92Updated last year
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Updated last year
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆46Updated last year
- curiosity got me here☆45Updated last year
- Learning FreeBSD Kernel Hacking - Exercises☆44Updated 5 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆70Updated 4 years ago