abhisek / reverse-engineering-and-malware-analysisLinks
Course content and slides from my ancient training on Reverse Engineering & Malware Analysis
☆153Updated 6 years ago
Alternatives and similar repositories for reverse-engineering-and-malware-analysis
Users that are interested in reverse-engineering-and-malware-analysis are comparing it to the libraries listed below
Sorting:
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- OSEE Preparation☆192Updated 6 years ago
- Collection of things made during my preparation to take on OSEE☆102Updated 6 years ago
- ☆318Updated 3 years ago
- ☆200Updated 8 years ago
- Linux Rootkits (4.x Kernel)☆87Updated 4 years ago
- Vulnerability examples.☆413Updated last week
- ☆212Updated 2 weeks ago
- x64 Windows Exploit Development☆116Updated last year
- A bunch of my exploit development helper tools, collected in one place.☆145Updated 3 years ago
- Fork of mona.py with x64dbg support☆109Updated 3 years ago
- ☆53Updated 2 years ago
- Exploiting challenges in Linux and Windows☆121Updated 6 years ago
- Exploit Development, Reverse Engineering & Cryptography☆257Updated 5 months ago
- Exercise writeups from the book Practical Malware Analysis.☆244Updated 2 years ago
- A repository of previous info-sec presentations I've presented.☆163Updated last year
- repository of tools & resources of the MMD team☆138Updated 3 years ago
- Personal research and publication on malware families☆142Updated last year
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- Exploitation and Mitigation Slides☆135Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 6 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆75Updated 6 years ago
- ☆138Updated 2 months ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆85Updated 8 years ago
- ☆182Updated 6 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- ☆140Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Miscellaneous Malware RE☆195Updated 3 years ago