PacktPublishing / Ghidra-Software-Reverse-Engineering-for-Beginners---Second-EditionLinks
Ghidra Software Reverse Engineering for Beginners - Second Edition, published by Packt
☆30Updated 8 months ago
Alternatives and similar repositories for Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition
Users that are interested in Ghidra-Software-Reverse-Engineering-for-Beginners---Second-Edition are comparing it to the libraries listed below
Sorting:
- Research notes☆128Updated 8 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated 2 weeks ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆113Updated 2 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- ☆113Updated last month
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- A collection of malware families and malware samples which use the Rust programming language.☆175Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆159Updated last year
- ☆48Updated 10 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆55Updated last week
- ☆69Updated 7 months ago
- ☆37Updated 8 months ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- A comprehensive Hypervisor resources repo☆118Updated this week
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆69Updated 2 weeks ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆16Updated last year
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆92Updated 3 weeks ago
- Binary Exploitation Phrack CTF Challenge☆124Updated 2 weeks ago
- Linpmem is a linux memory acquisition tool☆87Updated 2 months ago
- Rust out-of-tree Linux Kernel Modules (LKMs) experimentation framework☆49Updated 2 years ago
- Different learning materials☆228Updated 5 months ago
- Repository of Yara Rules☆115Updated 4 months ago
- Powershell Linter☆80Updated last month
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated last month
- Code snips and notes☆136Updated 3 years ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆69Updated 8 months ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆21Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆70Updated 8 months ago
- Malware Analysis Exercise Samples and Resources☆45Updated last week