A collection of resources to learn Reverse Engineering from start!
☆1,395Mar 18, 2025Updated last year
Alternatives and similar repositories for awesome-reversing
Users that are interested in awesome-reversing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hardcore Debugging☆938Jan 6, 2026Updated 3 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,422Apr 2, 2026Updated last week
- Cybersecurity oriented awesome list☆3,548Updated this week
- An emulation based tool for learning and debugging assembly.☆586Feb 1, 2026Updated 2 months ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,458Oct 4, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Organized list of my malware development resources☆1,706Apr 1, 2026Updated last week
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,361Mar 4, 2026Updated last month
- List of awesome reverse engineering resources☆10,014Jul 29, 2023Updated 2 years ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆753Nov 30, 2025Updated 4 months ago
- Compiler for the Jack Programming Language☆20Nov 5, 2024Updated last year
- EDR Lab for Experimentation Purposes☆1,430Mar 1, 2026Updated last month
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆764Jan 26, 2025Updated last year
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆118Jun 30, 2024Updated last year
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆129Aug 11, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Offensive Software Exploitation Course☆2,508May 31, 2023Updated 2 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆545Feb 13, 2024Updated 2 years ago
- A workshop about Malware Development☆1,776Jun 2, 2023Updated 2 years ago
- Reverse engineering focusing on x64 Windows.☆5,800Sep 10, 2025Updated 6 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- SoftWire lets you create new functions at run-time using functions and constructs which closely resemble x86 syntax, entirely within C++.…☆37Aug 25, 2014Updated 11 years ago
- Windows Local Privilege Escalation Cookbook☆1,295Feb 5, 2026Updated 2 months ago
- RE for champions☆15Updated this week
- Important notes and topics on my journey towards mastering Windows Internals☆435May 2, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Resources for Windows exploit development☆1,650Dec 20, 2021Updated 4 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated 2 months ago
- ☆335Sep 21, 2025Updated 6 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆688Jul 6, 2024Updated last year
- Performing Indirect Clean Syscalls☆607Apr 19, 2023Updated 2 years ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,357Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆3,181Mar 28, 2025Updated last year
- Collection of various malicious functionality to aid in malware development☆1,868Feb 28, 2024Updated 2 years ago
- CTF challenge (mostly pwn) files, scripts etc☆2,464Feb 11, 2026Updated last month
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- PE (and elf now!) bin2bin obfuscator☆832Oct 11, 2025Updated 5 months ago
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,565Updated this week
- Remote Thread Detection with a Kernel Driver☆34Jan 14, 2025Updated last year
- Solutions of xchg rax,rax☆15Jun 2, 2020Updated 5 years ago
- A curated list of awesome reversing resources☆4,481Aug 19, 2023Updated 2 years ago
- ☆2,958Feb 8, 2026Updated 2 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆594Aug 2, 2025Updated 8 months ago