Hex0r1 / RE_Mal_Exploit_TutorialsLinks
my reading list for reverse engineering malware & exploit development
☆15Updated 2 months ago
Alternatives and similar repositories for RE_Mal_Exploit_Tutorials
Users that are interested in RE_Mal_Exploit_Tutorials are comparing it to the libraries listed below
Sorting:
- The best resources for learning exploit development☆119Updated 6 years ago
 - x64 Windows Exploit Development☆114Updated last year
 - 0xpat blog☆104Updated 4 years ago
 - ☆69Updated 4 years ago
 - Collection of resources for my preparation to take the OSEE certification.☆294Updated 5 years ago
 - Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
 - This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆199Updated 5 years ago
 - ☆195Updated last year
 - A curated list of resources for the OSED journey.☆68Updated 3 years ago
 - Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆109Updated 2 years ago
 - Malware Analysis Tools☆30Updated 6 years ago
 - ☆316Updated 3 years ago
 - Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
 - Malware Samples that could be used for teaching students about malware analysis.☆61Updated last year
 - OSEE Preparation☆190Updated 6 years ago
 - Malware development for red teaming workshop☆223Updated 3 years ago
 - Resources for learning malware analysis and reverse engineering☆135Updated last year
 - ☆82Updated 8 years ago
 - A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
 - This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆96Updated 2 years ago
 - Resources for learning about Exploit Development☆408Updated 5 years ago
 - Just another collection of links, tools, reports and other stuff☆25Updated 4 years ago
 - Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆120Updated 5 years ago
 - Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
 - Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
 - ☆147Updated 5 years ago
 - This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
 - A collection of resources if you want to get into malware research. Pull requests are very welcome.☆118Updated 6 years ago
 - This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆202Updated 3 months ago
 - RE / Binary Exploitation Resources☆72Updated 7 years ago