abhisek / reverse-engineering-and-malware-analysisLinks
Course content and slides from my ancient training on Reverse Engineering & Malware Analysis
☆151Updated 5 years ago
Alternatives and similar repositories for reverse-engineering-and-malware-analysis
Users that are interested in reverse-engineering-and-malware-analysis are comparing it to the libraries listed below
Sorting:
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- OSEE Preparation☆189Updated 6 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- ☆315Updated 3 years ago
- Vulnerability examples.☆410Updated last year
- ☆198Updated 7 years ago
- Fork of mona.py with x64dbg support☆108Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆236Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Updated 2 months ago
- ☆210Updated 4 months ago
- x64 Windows Exploit Development☆114Updated last year
- A repository of previous info-sec presentations I've presented.☆162Updated 11 months ago
- ☆52Updated 2 years ago
- Exploitation and Mitigation Slides☆132Updated last year
- repository of tools & resources of the MMD team☆134Updated 3 years ago
- esoteric☆54Updated 5 years ago
- Exploiting challenges in Linux and Windows☆119Updated 5 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 6 years ago
- Personal research and publication on malware families☆141Updated 9 months ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆141Updated 3 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- Reversing list☆149Updated last year
- ☆182Updated 5 years ago
- Materials for the Binary Analysis Workshop presented at NorthSec 2020☆69Updated 4 years ago
- An advanced memory forensics framework☆96Updated 6 years ago