PacktPublishing / Mastering-Reverse-Engineering
Mastering Reverse Engineering, published by Packt
☆151Updated 2 years ago
Alternatives and similar repositories for Mastering-Reverse-Engineering:
Users that are interested in Mastering-Reverse-Engineering are comparing it to the libraries listed below
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated last year
- x64 Windows Exploit Development☆110Updated 6 months ago
- ☆104Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- Malware Analyst's Cookbook stuffs☆154Updated 9 years ago
- Exploit Development, Reverse Engineering & Cryptography☆250Updated 4 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆143Updated 5 years ago
- Collection of resources for my preparation to take the OSEE certification.☆269Updated 4 years ago
- Binary Analysis Cookbook, published by Packt☆41Updated 2 years ago
- Personal research and publication on malware families☆137Updated 2 months ago
- Free IDA Pro Binary Auditing Training Material for University Lectures - from http://binary-auditing.com . Contains decrypted/unzipped fi…☆168Updated last year
- Resources for learning malware analysis and reverse engineering☆106Updated last year
- 0xpat blog☆101Updated 3 years ago
- Code snips and notes☆135Updated 3 years ago
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆191Updated 4 years ago
- ☆48Updated 2 years ago
- OSEE Preparation☆173Updated 6 years ago
- Mastering Malware Analysis, published by Packt☆38Updated 2 years ago
- Malware Analysis Techniques, published by Packt☆69Updated 2 years ago
- The best resources for learning exploit development☆111Updated 5 years ago
- my reading list for reverse engineering malware & exploit development☆13Updated 2 months ago
- Software Reverse Engineering with Ghidra, published by Packt☆147Updated 2 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆141Updated 3 years ago
- ☆77Updated 3 years ago
- ☆298Updated 2 years ago
- ☆83Updated 7 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- Research notes☆121Updated 3 months ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆175Updated 7 months ago
- Exercise writeups from the book Practical Malware Analysis.☆201Updated last year