abhisek / reverse-engineering-and-malware-analysis
Course content and slides from my ancient training on Reverse Engineering & Malware Analysis
☆148Updated 5 years ago
Alternatives and similar repositories for reverse-engineering-and-malware-analysis:
Users that are interested in reverse-engineering-and-malware-analysis are comparing it to the libraries listed below
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- OSEE Preparation☆176Updated 6 years ago
- ☆192Updated 7 years ago
- ☆304Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- esoteric☆52Updated 4 years ago
- Vulnerability examples.☆404Updated last year
- Collection of resources for my preparation to take the OSEE certification.☆274Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- Exploitation and Mitigation Slides☆128Updated 11 months ago
- Malware dynamic instrumentation tool based on frida framework☆105Updated 4 years ago
- ☆234Updated 7 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆74Updated 7 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 6 months ago
- A bunch of my exploit development helper tools, collected in one place.☆141Updated 2 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆43Updated 2 years ago
- Fork of mona.py with x64dbg support☆103Updated 2 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆229Updated 4 years ago
- x64 Windows Exploit Development☆110Updated 8 months ago
- ☆145Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- ☆83Updated 7 years ago
- Exercise writeups from the book Practical Malware Analysis.☆206Updated last year
- Free IDA Pro Binary Auditing Training Material for University Lectures - from http://binary-auditing.com . Contains decrypted/unzipped fi…☆171Updated last year
- A Binary Ninja plugin for vulnerability research.☆294Updated 7 months ago
- Quickly debug shellcode extracted during malware analysis☆603Updated last year
- ☆134Updated last month
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆221Updated last year