DevenLu / Reverse-Engineering_-_Malware-AnalysisLinks
Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.
☆41Updated 8 years ago
Alternatives and similar repositories for Reverse-Engineering_-_Malware-Analysis
Users that are interested in Reverse-Engineering_-_Malware-Analysis are comparing it to the libraries listed below
Sorting:
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- A Simple PE File Heuristics Scanners☆49Updated 6 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 3 years ago
- Metamorphic Code Generator & Loader☆15Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Work in Progress repo☆14Updated 6 years ago
- AppXSVC Service race condition - privilege escalation☆28Updated 5 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆38Updated 3 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- I used this to see if an EDR is running in Safe Mode☆37Updated 4 years ago
- open source malware analysis and research notes dump☆26Updated last year
- My Malware Analysis Reports☆20Updated 3 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆19Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14Updated 5 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- A simple injector that uses LoadLibraryA☆18Updated 4 years ago
- Mastering Malware Analysis, published by Packt☆39Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆35Updated 3 years ago
- ☆16Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago