Pix-xiP / HackingBooksLinks
Study materials for ethical hacking and cyber security
☆80Updated 6 years ago
Alternatives and similar repositories for HackingBooks
Users that are interested in HackingBooks are comparing it to the libraries listed below
Sorting:
- Reverse Engineering and Malware Analysis Roadmap☆564Updated 4 months ago
- A comprehensive Hypervisor resources repo☆190Updated 3 months ago
- ☆57Updated last year
- companion to our book of the same name, ISBN: 9781394199884☆165Updated 2 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆213Updated 6 months ago
- Pure Malware Development Resource Collections☆418Updated last year
- Reverse Engineering challenges☆36Updated 5 years ago
- Study materials for ethical hacking and cyber security☆65Updated 6 years ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆730Updated 2 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆177Updated 6 months ago
- Malware Development for Ethical Hackers, published by Packt☆438Updated last week
- Cybersecurity research results. Simple C/C++ and Python implementations☆290Updated last week
- 🧞♂️ malware analysis☆38Updated last year
- books☆205Updated 8 years ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆157Updated 6 months ago
- Important notes and topics on my journey towards mastering Windows Internals☆426Updated last year
- Backup copy of [SnD] [lena151] Reversing With Lena (Tutorials)☆137Updated 5 years ago
- A tutorial on how to write a packer for Windows!☆308Updated 2 years ago
- Guided Hacking's official tool to practice bypassing anti-debug techniques.☆314Updated 8 months ago
- x64 Dynamic Reverse Engineering Toolkit☆738Updated 2 years ago
- ⚠️ malware development☆681Updated last year
- Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine…☆321Updated 4 months ago
- Solutions to some crackmes that I have done.☆71Updated 3 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆165Updated 3 years ago
- Collection of codes focused on Linux rootkits☆195Updated 3 months ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆51Updated 2 years ago
- A FREE comprehensive step-by-step embedded hacking course covering Embedded Software Development to Reverse Engineering.☆187Updated last week
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆128Updated 2 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆167Updated 2 years ago
- ☆69Updated 4 years ago