AlyaGomaa / bitsbehumble
A lightweight type converter python library.
☆13Updated 4 years ago
Alternatives and similar repositories for bitsbehumble:
Users that are interested in bitsbehumble are comparing it to the libraries listed below
- ☆10Updated 4 years ago
- Writeups for the challenges i wrote for ASCWG quals☆11Updated 2 years ago
- ☆12Updated 4 years ago
- ☆14Updated 4 years ago
- my write-ups to some challenges I solved in various categories.☆8Updated 3 years ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆41Updated 4 years ago
- Intro To CTF In Arabic☆17Updated 4 years ago
- Analysis Reports of Malwares☆11Updated 5 years ago
- ☆78Updated 2 years ago
- ☆13Updated 11 months ago
- ☆16Updated 2 months ago
- Revers3c-Team CTF writeups☆21Updated 5 years ago
- Reverse Engineering Resources☆225Updated 6 years ago
- Malware dynamic instrumentation tool based on frida framework☆103Updated 4 years ago
- ☆39Updated 3 years ago
- Free IDA Pro Binary Auditing Training Material for University Lectures - from http://binary-auditing.com . Contains decrypted/unzipped fi…☆168Updated last year
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆101Updated 5 years ago
- ☆6Updated 4 years ago
- a collection of Advanced Malwares and APT tools for geek analysts to play with☆43Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆48Updated 5 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- steganography project for rowdy hacks 2019 hackathon☆20Updated 3 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- ☆53Updated 2 years ago
- RSHack - Tool for RSA CTF's challenges☆91Updated 6 years ago
- Github Repository for Writeups of vishwaCTF'21 Challenges☆10Updated 3 years ago
- ☆14Updated 2 months ago
- Honeybag helps you to create 'bait archive' with any folders and files, notify you if someone accesses it☆16Updated 4 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Updated last year
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆143Updated 5 years ago