Malware analysis and Reverse Engineering Workshops from Invoke RE
☆15Jun 30, 2024Updated last year
Alternatives and similar repositories for workshops
Users that are interested in workshops are comparing it to the libraries listed below
Sorting:
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆24Sep 29, 2024Updated last year
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- BlackArch Linux Keyring☆25Oct 11, 2025Updated 4 months ago
- AVX-2 vectorised 8-bit positional popcount for Go☆23Aug 28, 2020Updated 5 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- List of Sanctions and Most wanted☆29Jun 9, 2017Updated 8 years ago
- Collect email addresses by crawling search engine results.☆30Dec 8, 2022Updated 3 years ago
- ☆40Aug 25, 2018Updated 7 years ago
- YETI is a TAXII implementation☆47May 10, 2019Updated 6 years ago
- Collection of BOFs for Cobalt Strike☆32Mar 28, 2023Updated 2 years ago
- An extremely experimental Binary Ninja importer for the type layout information emitted by the -Zprint-type-sizes flag of the Rust compil…☆38Jul 3, 2023Updated 2 years ago
- Samsung Galaxy A54 5G firmware binaries.☆11Feb 28, 2024Updated 2 years ago
- Scripts for Daz Studio☆11Jan 8, 2025Updated last year
- Intel 64/Windows low-level experiments☆63Aug 25, 2025Updated 6 months ago
- Tutorial: Statistical Relational Learning with Google TensorFlow☆40Mar 8, 2016Updated 9 years ago
- Data notification service: subscribe to keywords and get notified whenever an open data sources mentions that keyword.☆24Aug 25, 2013Updated 12 years ago
- Simple Wordsearch Solving Python Script☆12Jul 8, 2018Updated 7 years ago
- Roadmap for Lantern development☆12Mar 2, 2018Updated 7 years ago
- ☆13Mar 28, 2024Updated last year
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Identify the technologies powering any website☆11Sep 19, 2023Updated 2 years ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- aarch64 Malware course☆11Nov 13, 2025Updated 3 months ago
- This is meant to be a ray tracer in golang☆12Dec 31, 2023Updated 2 years ago
- BH Cypher Queries picked up from random places☆41Dec 12, 2018Updated 7 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- convert formatted text to markdown☆13Dec 29, 2025Updated 2 months ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- Example ASM code following SLAE course and exam assignments.☆37May 23, 2017Updated 8 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Dec 9, 2020Updated 5 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- Python client library for the ClamAV antivirus.☆12May 15, 2025Updated 9 months ago
- ☆12Jul 10, 2015Updated 10 years ago
- Pure Go bindings for Zydis.☆13Jul 14, 2024Updated last year
- Data Driven Journalism Handbook☆23Sep 23, 2012Updated 13 years ago
- A rust crate for parsing, writing and manipulating Android smali files.☆16Jan 14, 2026Updated last month