companion to our book of the same name, ISBN: 9781394199884
☆179Feb 7, 2024Updated 2 years ago
Alternatives and similar repositories for X86-SOFTWARE-REVERSE-ENGINEERING-CRACKING-AND-COUNTER-MEASURES
Users that are interested in X86-SOFTWARE-REVERSE-ENGINEERING-CRACKING-AND-COUNTER-MEASURES are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Living of the Land of Free SaaS☆70Mar 22, 2026Updated 3 weeks ago
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated last month
- ☆16Sep 23, 2021Updated 4 years ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆127Feb 25, 2026Updated last month
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆33Dec 31, 2025Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Anti-Cheat Artifacts detector for IDA☆96Jan 2, 2026Updated 3 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆61Nov 24, 2025Updated 4 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆62Apr 8, 2026Updated last week
- ☆176Mar 16, 2026Updated 3 weeks ago
- ☆24Jan 27, 2026Updated 2 months ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 11 months ago
- Overflowme is a walkthrough to learn the basics of binary exploitation. Detailed instructions, stack diagrams and fully commented assembl…☆70Apr 30, 2025Updated 11 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 5 months ago
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Aug 14, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆89Aug 1, 2025Updated 8 months ago
- RE for champions☆15Updated this week
- ☆16Jan 14, 2016Updated 10 years ago
- ☆77Mar 28, 2026Updated 2 weeks ago
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 5 months ago
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- This repository is for the Testing ASP.NET ViewState with YSoNet (YSoSerial.NET) workshop.☆23Dec 17, 2025Updated 3 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆88Dec 29, 2023Updated 2 years ago
- Security Blogs - A simple aggregator for security news/blog☆25Mar 31, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- This repository dedicated to collect SIEM practice labs (Splunk and Elastic) from various cybersecurity training platforms☆60Mar 30, 2026Updated 2 weeks ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- GiveWP PHP Object Injection exploit☆12Oct 1, 2024Updated last year
- MCP Firefox browser automation extension for Claude Code - screenshots, clicking, typing, page refresh, and AI-powered web interaction☆36Dec 23, 2025Updated 3 months ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆104Jan 9, 2026Updated 3 months ago
- Slides and resources from MCTTP 2025 Talk☆70Oct 26, 2025Updated 5 months ago
- FTDI bricker just for fun - malware POC+hardware hacking CTF☆19Sep 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An Obsidian plugin which renders console commands and their output.☆20Feb 5, 2024Updated 2 years ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆19Aug 4, 2024Updated last year
- Simple HTTP async comms using standard GET/POST requests☆49Feb 5, 2026Updated 2 months ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆88Apr 11, 2023Updated 3 years ago
- Proof of Concept for CVE-2025-24367☆36Dec 8, 2025Updated 4 months ago
- NoMoreStealers is a Windows file system minifilter driver that protects sensitive user data from untrusted processes.☆97Nov 7, 2025Updated 5 months ago
- Welcome to the secure code review snippets for secure code review snippets! This repository aims to provide developers with valuable exam…☆14Feb 19, 2025Updated last year