my reading list for reverse engineering malware & exploit development
☆15Feb 3, 2026Updated 3 weeks ago
Alternatives and similar repositories for RE_Mal_Exploit_Tutorials
Users that are interested in RE_Mal_Exploit_Tutorials are comparing it to the libraries listed below
Sorting:
- Red Team Operator: Malware Development Essentials Course☆100Jun 18, 2020Updated 5 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆28Feb 22, 2023Updated 3 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- Penetration testing course by Z0F.☆52Oct 6, 2021Updated 4 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- ☆14May 14, 2022Updated 3 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.☆16May 22, 2025Updated 9 months ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 7 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- Looking for React.js jobs? Here are the most popular React Interview Questions and Answers which are most likely to be asked by the inter…☆10Jul 18, 2020Updated 5 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- How to write a CrackMe for a CTF competition. Source code, technical explanation, anti-debugging and anti reverse-engineering tricks.☆46Mar 11, 2023Updated 2 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆11Nov 5, 2020Updated 5 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Excel Add-in samples and using macro in add-in☆10Dec 12, 2023Updated 2 years ago
- XHacks: Python-fueled nightmare for X account defenses. AI-driven brute-force tears through with ruthless stealth and speed. Ethical hack…☆16Nov 14, 2025Updated 3 months ago
- ☆10Jul 5, 2020Updated 5 years ago
- a tiny script that automates downloading files from guc cms website☆14Nov 13, 2023Updated 2 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- PowerShell module to assist with Group Policy☆14Jan 6, 2020Updated 6 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Working files for the Docker and Kubernetes course from Udemy taught by Stephen Grider (StephenGrider)☆13Jan 25, 2023Updated 3 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.☆11Aug 1, 2024Updated last year
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago