Pix-xiP / HackingBooks
Study materials for ethical hacking and cyber security
☆55Updated 5 years ago
Alternatives and similar repositories for HackingBooks
Users that are interested in HackingBooks are comparing it to the libraries listed below
Sorting:
- Reverse Engineering and Malware Analysis Roadmap☆147Updated last week
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆143Updated 2 years ago
- A tutorial on how to write a packer for Windows!☆273Updated last year
- A comprehensive Hypervisor resources repo☆107Updated 3 months ago
- x64 Dynamic Reverse Engineering Toolkit☆648Updated last year
- Guided Hacking's official tool to practice bypassing anti-debug techniques.☆268Updated this week
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆123Updated last year
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆337Updated 3 weeks ago
- Collection of codes focused on Linux rootkits☆107Updated 2 months ago
- Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks☆318Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆200Updated 6 months ago
- My reversing tools. Some custom, some not.☆203Updated last year
- A dynamic unpacking tool☆136Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆43Updated last month
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)☆261Updated 8 months ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆533Updated last year
- PoC Anti-Rootkit/Anti-Cheat Driver.☆192Updated 3 weeks ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆43Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆250Updated last year
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆363Updated last year
- Efi Driver Access is a simply project to load a driver during system boot with the idea to give the user kernel access for read/write mem…☆414Updated 2 years ago
- ☆285Updated this week
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆28Updated 2 years ago
- A utility for playing with cryptography, geared towards ransomware analysis.☆285Updated 3 months ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆325Updated 3 years ago
- PE bin2bin obfuscator☆690Updated last month
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆100Updated 2 years ago
- x86 PE Mutator☆217Updated 2 years ago
- Websites & tools that will help you into learning game hacking☆84Updated 2 years ago
- Vulnerable driver research tool, result and exploit PoCs☆193Updated last year