8ctopus / legendofrandom
The legend of random website
☆16Updated 2 weeks ago
Alternatives and similar repositories for legendofrandom:
Users that are interested in legendofrandom are comparing it to the libraries listed below
- anything I find interesting regarding reverse engineering☆11Updated 7 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆119Updated last year
- ☆12Updated last year
- Drawing inspiration from Andrej Karpathy’s iconic lecture, "Let’s Build GPT: From Scratch, in Code, Spelled Out", this project takes you …☆13Updated 4 months ago
- Repo for the UEFI Development Series☆49Updated last month
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- ☆34Updated this week
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆78Updated 8 months ago
- x86 OS development using Bochs emulator. MIT xv6, JamesM's kernel development tutorials (with some changes) & more☆80Updated last year
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆39Updated last year
- curiosity got me here☆36Updated 8 months ago
- Solutions to some crackmes that I have done.☆65Updated 2 years ago
- Ghidra Software Reverse Engineering for Beginners - Second Edition, published by Packt☆11Updated 3 months ago
- ⚠️ Collection of malicious file ⚠️☆12Updated 3 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆10Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆142Updated 2 years ago
- PoC that measures how long it takes the CPU to execute the CPUID instruction and reports if it suspects a VM. Works on both Windows and L…☆25Updated 4 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆46Updated 4 months ago
- ☆43Updated last year
- Stuxnet is an extremely sophisticated computer worm that exploits multiple previously unknown Windows zero-day vulnerabilities to infect …☆62Updated 3 years ago
- Dynamic and Static Analysis with Sandboxie for Windows with ClamAV, YARA-X, my machine learning AI, Behaviour analysis, NLP-Based detecti…☆58Updated this week
- IDA Type Info Libraries for RE☆27Updated 2 months ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆13Updated 11 months ago
- String Fixer for ConfuserEx2☆15Updated 2 years ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆20Updated 2 weeks ago
- Found resources in my malware researching adventure.☆16Updated 2 years ago
- The DataExplorer plugin integrates the pattern language from ImHex into x64dbg.☆76Updated 2 months ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆77Updated 2 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆40Updated 3 months ago
- The Linux x86/x86-64 last chance debugging tool☆47Updated 2 years ago