QuantumWizard888 / Reverse-Engineering-crackmes-with-Ghidra
A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.
☆27Updated last week
Alternatives and similar repositories for Reverse-Engineering-crackmes-with-Ghidra:
Users that are interested in Reverse-Engineering-crackmes-with-Ghidra are comparing it to the libraries listed below
- ☆16Updated 2 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆10Updated 2 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆18Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated 3 weeks ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 6 months ago
- Found resources in my malware researching adventure.☆16Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- ☆12Updated 4 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 2 years ago
- x86_64 LKM linux rootkit☆16Updated last year
- Trojan written in C++ for Windows☆17Updated last year
- ☆24Updated 2 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- ☆32Updated last year
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆17Updated 8 months ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated 11 months ago
- ☆9Updated 3 weeks ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- MemoryBlade Repository: A comprehensive collection of advanced memory hacking techniques, tools, and resources specifically tailored for…☆12Updated last year
- Python, C++ and Go☆23Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆11Updated 3 years ago
- ☆37Updated last month