QuantumWizard888 / Reverse-Engineering-crackmes-with-GhidraLinks
A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.
☆28Updated 5 months ago
Alternatives and similar repositories for Reverse-Engineering-crackmes-with-Ghidra
Users that are interested in Reverse-Engineering-crackmes-with-Ghidra are comparing it to the libraries listed below
Sorting:
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- ☆33Updated 2 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated 2 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Updated 2 months ago
- ☆37Updated 7 months ago
- Python, C++ and Go☆22Updated 3 years ago
- Packet crafting, injection and sniffing tool☆69Updated 2 months ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆46Updated last year
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 9 months ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆24Updated 4 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- IDA Python scripts☆41Updated 6 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Updated 2 years ago
- ☆20Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆14Updated this week
- General malware analysis stuff☆37Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 6 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- A dynamic unpacking tool☆141Updated 2 years ago
- My malware analysis code snippets☆29Updated 2 years ago
- Get started with writing your first ever Windows Driver☆35Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)☆144Updated 2 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year