ReversingID / Awesome-ReversingLinks
A curated list of awesome reverse engineering resources for various topics
☆587Updated last year
Alternatives and similar repositories for Awesome-Reversing
Users that are interested in Awesome-Reversing are comparing it to the libraries listed below
Sorting:
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆711Updated 2 weeks ago
- A not so awesome list of malware gems for aspiring malware analysts☆824Updated 2 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆913Updated last year
- Resources for learning about Exploit Development☆415Updated 5 years ago
- A curated list of awesome resources related to executable packing☆1,489Updated 5 months ago
- ☆146Updated 9 months ago
- Organized list of my malware development resources☆1,669Updated 3 years ago
- Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
- A curated list of awesome Ghidra materials☆1,334Updated 4 years ago
- Resources for Windows exploit development☆1,631Updated 3 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆674Updated last year
- A collection of awesome videos, articles, books and resources about ARM exploitation.☆351Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆368Updated 8 months ago
- Collection of resources I have used throughout my studies (cybersecurity and systems)☆229Updated last year
- ☆259Updated 2 years ago
- ☆550Updated 3 years ago
- A list of helpful cybersecurity / infosec resources☆1,340Updated last year
- Resources for learning about cybersecurity and CTFs☆225Updated 3 years ago
- A list of Reverse Engineering articles, books, and papers☆2,602Updated 2 years ago
- Course materials for hackaday.io Ghidra training☆415Updated last year
- ☆475Updated 3 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆940Updated 2 years ago
- ⚠️ malware development☆637Updated last year
- Reverse engineering focusing on x64 Windows.☆5,554Updated 3 months ago
- knowledge is power☆229Updated 4 months ago
- Research code & papers from members of vx-underground.☆1,333Updated 4 years ago
- Reverse Engineering Resources☆229Updated 7 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,290Updated 5 years ago
- ☆650Updated 8 months ago
- List of Awesome Advanced Windows Exploitation References☆1,533Updated 3 years ago