companion to our book of the same name, ISBN: 9781394199884
☆173Feb 7, 2024Updated 2 years ago
Alternatives and similar repositories for X86-SOFTWARE-REVERSE-ENGINEERING-CRACKING-AND-COUNTER-MEASURES
Users that are interested in X86-SOFTWARE-REVERSE-ENGINEERING-CRACKING-AND-COUNTER-MEASURES are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- ☆16Sep 23, 2021Updated 4 years ago
- Skyrim and Fallout python tools for creating address libraries for VR☆15Mar 16, 2026Updated last week
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆125Feb 25, 2026Updated 3 weeks ago
- Copy a floppy/hard drive from one computer to another via a serial null modem connection☆15Sep 16, 2023Updated 2 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆32Dec 31, 2025Updated 2 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆60Nov 24, 2025Updated 3 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆57Updated this week
- ☆174Mar 16, 2026Updated last week
- ☆23Jan 27, 2026Updated last month
- template for developing custom C2 channels for Cobalt Strike using IAT hooks applied by a reflective loader.☆101Jan 10, 2026Updated 2 months ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1☆20Mar 19, 2024Updated 2 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 4 months ago
- C# application for creating and comparing registry key snapshots☆17Jul 5, 2022Updated 3 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆89Aug 1, 2025Updated 7 months ago
- RE for champions☆15Updated this week
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆19Nov 11, 2025Updated 4 months ago
- ☆72Jan 31, 2025Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- This repository dedicated to collect SIEM practice labs (Splunk and Elastic) from various cybersecurity training platforms☆57Mar 15, 2026Updated last week
- Security Blogs - A simple aggregator for security news/blog☆25Mar 16, 2026Updated last week
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- A small PHP based website for testing the essentials of a web crawler☆15Sep 6, 2023Updated 2 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- GiveWP PHP Object Injection exploit☆12Oct 1, 2024Updated last year
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆103Jan 9, 2026Updated 2 months ago
- ☆10Jul 1, 2025Updated 8 months ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Oct 3, 2025Updated 5 months ago
- Slides and resources from MCTTP 2025 Talk☆68Oct 26, 2025Updated 4 months ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆19Aug 4, 2024Updated last year
- Simple HTTP async comms using standard GET/POST requests☆49Feb 5, 2026Updated last month
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆87Apr 11, 2023Updated 2 years ago
- Proof of Concept for CVE-2025-24367☆34Dec 8, 2025Updated 3 months ago
- A simple 28C16 EEPROM writer for Arduino Nano or Uno☆17Dec 16, 2025Updated 3 months ago