DevenLu / Reverse-Engineering_-_Malware-AnalysisLinks
Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.
☆40Updated 8 years ago
Alternatives and similar repositories for Reverse-Engineering_-_Malware-Analysis
Users that are interested in Reverse-Engineering_-_Malware-Analysis are comparing it to the libraries listed below
Sorting:
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Sources code extracted from malwares for analysis☆39Updated 2 years ago
- open source malware analysis and research notes dump☆26Updated last year
- Dumping credentials through windbg and pykd☆41Updated last year
- Cross-platform malware development library for anti-analysis techniques☆24Updated 4 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆74Updated 4 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 2 months ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆58Updated 3 years ago
- x64 Windows package of the shellcode2exe tool☆14Updated 4 years ago
- A Simple PE File Heuristics Scanners☆51Updated 6 years ago
- Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.☆76Updated 2 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 5 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Updated 4 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 3 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago
- Let's try to create a rootkit!☆20Updated 5 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- QuasarRAT analysis tools and research report☆27Updated last year