8ctopus / legendofrandom
The legend of random website
☆12Updated last week
Related projects ⓘ
Alternatives and complementary repositories for legendofrandom
- Some basic info, resources, and code snippets about windows kernel exploitation☆10Updated last year
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆36Updated 7 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆121Updated 2 years ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆70Updated 3 weeks ago
- Found resources in my malware researching adventure.☆15Updated last year
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated 2 years ago
- Corrupted files generator. Random bits flipper.☆22Updated last year
- A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.☆23Updated 9 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆115Updated last year
- Solutions to some crackmes that I have done.☆60Updated 2 years ago
- ☆36Updated last year
- Advanced driver monitoring utility.☆201Updated 2 years ago
- x86 OS development using Bochs emulator. MIT xv6, JamesM's kernel development tutorials (with some changes) & more☆78Updated last year
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆28Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆32Updated last year
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆68Updated 4 months ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆13Updated 7 months ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆36Updated 7 months ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆42Updated 9 months ago
- Code snippets for Reverse engineering training for xtraining platform☆32Updated last year
- This contains notes, slides, and code for my Strange Loop talk☆24Updated last year
- Public repository containing materials for various malware-related streams.☆26Updated last month
- My notes while studying Windows exploitation☆184Updated last year
- Python implementation of the Packed Executable iDentifier (PEiD)☆128Updated 5 months ago
- A dynamic unpacking tool☆128Updated last year
- Simple x86/x64 Assembler/Disassembler/Emulator☆169Updated 3 months ago
- curiosity got me here☆33Updated 3 months ago
- Binary Golf Grand Prix☆45Updated 2 months ago
- Research notes☆115Updated last month