PacktPublishing / Mastering-Reverse-EngineeringLinks
Mastering Reverse Engineering, published by Packt
☆169Updated 3 years ago
Alternatives and similar repositories for Mastering-Reverse-Engineering
Users that are interested in Mastering-Reverse-Engineering are comparing it to the libraries listed below
Sorting:
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆123Updated 2 years ago
- 0xpat blog☆109Updated 4 years ago
- Malware Analysis Techniques, published by Packt☆78Updated 3 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆152Updated 6 years ago
- ☆54Updated 2 years ago
- Mastering Malware Analysis, published by Packt☆41Updated 3 years ago
- x64 Windows Exploit Development☆116Updated last year
- Exploit Development, Reverse Engineering & Cryptography☆257Updated 5 months ago
- Advanced Malware Analysis [video], published by Packt☆22Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆143Updated last year
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆228Updated 3 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- repository of tools & resources of the MMD team☆137Updated 3 years ago
- Personal research and publication on malware families☆142Updated last year
- Free IDA Pro Binary Auditing Training Material for University Lectures - from http://binary-auditing.com . Contains decrypted/unzipped fi…☆187Updated 2 years ago
- Code snips and notes☆140Updated 3 years ago
- ☆109Updated 6 years ago
- Malware Analyst's Cookbook stuffs☆158Updated 10 years ago
- Binary Analysis Cookbook, published by Packt☆44Updated 2 years ago
- A repo to support the book☆46Updated 3 years ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆122Updated 6 years ago
- Software Reverse Engineering with Ghidra, published by Packt☆164Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆242Updated 2 years ago
- my reading list for reverse engineering malware & exploit development☆15Updated 5 months ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Updated last year
- A collection of techniques commonly used in malware to accomplish core tasks.☆83Updated 6 years ago
- Collection of resources that are made by the Malware Research community☆235Updated 2 years ago
- The best resources for learning exploit development☆122Updated 6 years ago
- Reverse Engineering Resources☆231Updated 7 years ago