Pix-xiP / HackingBooksLinks
Study materials for ethical hacking and cyber security
☆61Updated 5 years ago
Alternatives and similar repositories for HackingBooks
Users that are interested in HackingBooks are comparing it to the libraries listed below
Sorting:
- Reverse Engineering and Malware Analysis Roadmap☆193Updated last month
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆572Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆144Updated 2 years ago
- A comprehensive Hypervisor resources repo☆110Updated last week
- Cybersecurity research results. Simple C/C++ and Python implementations☆229Updated this week
- A tutorial on how to write a packer for Windows!☆276Updated last year
- Solutions to some crackmes that I have done.☆69Updated 2 years ago
- Pure Malware Development Resource Collections☆300Updated 5 months ago
- Important notes and topics on my journey towards mastering Windows Internals☆390Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆43Updated last year
- Study materials for ethical hacking and cyber security☆51Updated 5 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆45Updated 2 months ago
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)☆280Updated 9 months ago
- C++ Programming for Hackers☆40Updated 5 months ago
- Guided Hacking's official tool to practice bypassing anti-debug techniques.☆277Updated 3 weeks ago
- x64 Dynamic Reverse Engineering Toolkit☆661Updated 2 years ago
- Malware Development for Ethical Hackers, published by Packt☆326Updated 6 months ago
- Simple x86/x64 Assembler/Disassembler/Emulator☆184Updated 10 months ago
- books☆200Updated 8 years ago
- Centralized resource for listing and organizing known injection techniques and POCs☆564Updated 2 weeks ago
- Reverse Engineering tools☆203Updated 2 years ago
- companion to our book of the same name, ISBN: 9781394199884☆94Updated last year
- Programming course for Wannabes☆52Updated 4 months ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆85Updated 6 months ago
- Vulnerable driver research tool, result and exploit PoCs☆194Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆58Updated last month
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆222Updated 7 months ago
- My notes while studying Windows exploitation☆188Updated last year
- ☆114Updated last month
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆144Updated 2 years ago