HACKE-RC / awesome-reversingView external linksLinks
A collection of resources to learn Reverse Engineering from start!
☆1,381Mar 18, 2025Updated 10 months ago
Alternatives and similar repositories for awesome-reversing
Users that are interested in awesome-reversing are comparing it to the libraries listed below
Sorting:
- Hardcore Debugging☆929Jan 6, 2026Updated last month
- Cybersecurity oriented awesome list☆3,044Feb 8, 2026Updated last week
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,238Updated this week
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,438Oct 4, 2024Updated last year
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,289Feb 1, 2026Updated 2 weeks ago
- An emulation based tool for learning and debugging assembly.☆581Feb 1, 2026Updated 2 weeks ago
- Organized list of my malware development resources☆1,700May 16, 2022Updated 3 years ago
- Compiler for the Jack Programming Language☆20Nov 5, 2024Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆757Jan 26, 2025Updated last year
- EDR Lab for Experimentation Purposes☆1,409Jan 20, 2026Updated 3 weeks ago
- PE (and elf now!) bin2bin obfuscator☆812Oct 11, 2025Updated 4 months ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆117Jun 30, 2024Updated last year
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆733Nov 30, 2025Updated 2 months ago
- List of awesome reverse engineering resources☆9,925Jul 29, 2023Updated 2 years ago
- Offensive Software Exploitation Course☆2,396May 31, 2023Updated 2 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆539Feb 13, 2024Updated 2 years ago
- Windows Local Privilege Escalation Cookbook☆1,266Feb 5, 2026Updated last week
- A workshop about Malware Development☆1,759Jun 2, 2023Updated 2 years ago
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,556Feb 9, 2026Updated last week
- Now You See Me, Now You Don't☆1,023Jan 23, 2026Updated 3 weeks ago
- Resources for Windows exploit development☆1,648Dec 20, 2021Updated 4 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- PoCs for Kernelmode rootkit techniques research.☆429Nov 4, 2025Updated 3 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆128Aug 11, 2023Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Feb 2, 2026Updated 2 weeks ago
- Performing Indirect Clean Syscalls☆603Apr 19, 2023Updated 2 years ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,166Feb 3, 2026Updated last week
- Awesome EDR Bypass Resources For Ethical Hacking☆1,476Jan 26, 2026Updated 3 weeks ago
- Collection of various malicious functionality to aid in malware development☆1,838Feb 28, 2024Updated last year
- Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls☆389Oct 8, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,143Mar 28, 2025Updated 10 months ago
- Reverse engineering focusing on x64 Windows.☆5,605Sep 10, 2025Updated 5 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,010Jan 7, 2026Updated last month
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,202Feb 1, 2026Updated 2 weeks ago
- x64 Dynamic Reverse Engineering Toolkit☆741May 30, 2023Updated 2 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆853Feb 2, 2024Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆972Sep 3, 2023Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,821Updated this week
- The Havoc Framework☆8,158Dec 18, 2025Updated last month