8ctopus / legendofrandomLinks
The legend of random website
☆17Updated 2 months ago
Alternatives and similar repositories for legendofrandom
Users that are interested in legendofrandom are comparing it to the libraries listed below
Sorting:
- ☆47Updated last year
- Solutions to some crackmes that I have done.☆68Updated 2 years ago
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆40Updated last year
- Python implementation of the Packed Executable iDentifier (PEiD)☆139Updated last year
- A step-by-step walkthrough of the inner workings of a simple neural network. The goal is to demystify the calculations behind neural netw…☆17Updated 3 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- ☆36Updated this week
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆144Updated 2 years ago
- Native Python3 bindings for @horsicq's Detect-It-Easy☆68Updated 3 weeks ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆124Updated last year
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆47Updated 6 months ago
- Research notes☆125Updated 6 months ago
- Disassembler for X86-64 implemented from scratch in C++☆29Updated 3 months ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated this week
- Learning assembly x86 programming and reverse engineering☆13Updated 4 years ago
- Supporting code and apps for demonstrating Android interprocess communication☆41Updated 10 months ago
- Repository for the code snippets from the AllThingsIDA video channel☆109Updated this week
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆41Updated 5 months ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆85Updated 6 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆229Updated last week
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆159Updated 2 years ago
- The Linux x86/x86-64 last chance debugging tool☆47Updated 2 years ago
- A curated list of awesome resources related to anti virtualization techniques☆51Updated last month
- ☆35Updated last year
- Workshop Material on VM-based Deobfuscation☆188Updated 3 years ago
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- Code snips and notes☆137Updated 3 years ago
- Ghidra plugin for HashDB☆19Updated last year
- Advanced driver monitoring utility.☆211Updated 2 years ago