abhisek / reverse-engineering-and-malware-analysisLinks
Course content and slides from my ancient training on Reverse Engineering & Malware Analysis
☆148Updated 5 years ago
Alternatives and similar repositories for reverse-engineering-and-malware-analysis
Users that are interested in reverse-engineering-and-malware-analysis are comparing it to the libraries listed below
Sorting:
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- OSEE Preparation☆179Updated 6 years ago
- ☆306Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- ☆193Updated 7 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Collection of resources for my preparation to take the OSEE certification.☆276Updated 4 years ago
- Exploitation and Mitigation Slides☆128Updated last year
- Vulnerability examples.☆405Updated last year
- Fork of mona.py with x64dbg support☆103Updated 3 years ago
- ☆235Updated 7 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- Exercise writeups from the book Practical Malware Analysis.☆227Updated last year
- esoteric☆54Updated 4 years ago
- Keep track of the labs from the book "Practical Malware Analysis"☆171Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- x64 Windows Exploit Development☆111Updated 9 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Code snips and notes☆137Updated 3 years ago
- A bunch of my exploit development helper tools, collected in one place.☆141Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆76Updated 7 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- A Binary Ninja plugin for vulnerability research.☆294Updated 8 months ago
- ☆182Updated 5 years ago
- API Logger for Windows Executables☆78Updated 4 years ago
- ☆138Updated 3 years ago
- ☆200Updated 3 weeks ago
- Malware dynamic instrumentation tool based on frida framework☆105Updated 4 years ago