Mohamed-94 / Group-of-Assembly-Programs-Samples--8086-85-Processors-family-Links
A large group of assembly language programs & samples ..with different topics and levels..from Ascci to Stack - assembly programming.
☆16Updated 5 years ago
Alternatives and similar repositories for Group-of-Assembly-Programs-Samples--8086-85-Processors-family-
Users that are interested in Group-of-Assembly-Programs-Samples--8086-85-Processors-family- are comparing it to the libraries listed below
Sorting:
- Some of the Anti-Debugging Tricks☆28Updated 8 years ago
- ☆25Updated 9 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- x86 Assembly Adventures code snippets☆118Updated 7 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- [SPOILER ALERT] My attempt at tackling the x86_64 asm riddles in xorpd's xchg rax,rax book. Pull requests welcome.☆89Updated 3 weeks ago
- WinDbg workplace settings that I use for debugging☆16Updated 8 years ago
- Damn vulnerable linux device driver for people to play with.☆28Updated 5 years ago
- A rootkit implemented as a linux kernel module☆17Updated 10 years ago
- With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger☆40Updated 2 years ago
- Rootkit Arsenal 2nd Source Code☆14Updated 12 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆42Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- Introductory software reverse engineering tutorial for beginners☆36Updated 6 years ago
- Poc for ELF64 runtime infection via GOT poisoning technique by elfmaster☆30Updated 5 years ago
- Flare-On solutions☆37Updated 6 years ago
- Windows Inline function hooking library targeted at MSVC☆27Updated 9 years ago
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆45Updated 7 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆21Updated 8 years ago
- Simple virtual machine for teaching basic concepts of virtual machine implementation.☆29Updated 6 years ago
- ☆18Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- writeups for CTFs and other stuff☆23Updated 4 years ago
- Code from the book "Designing BSD Rootkits: An Introduction to Kernel Hacking"☆45Updated 9 years ago
- My manual analysis of malware families☆13Updated 8 years ago
- Zerokit shared code☆17Updated 6 years ago
- Linux kernel internals' notes☆20Updated last year
- ☆23Updated 4 years ago