abhisek / reverse-engineering-and-malware-analysisLinks
Course content and slides from my ancient training on Reverse Engineering & Malware Analysis
☆148Updated 5 years ago
Alternatives and similar repositories for reverse-engineering-and-malware-analysis
Users that are interested in reverse-engineering-and-malware-analysis are comparing it to the libraries listed below
Sorting:
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- OSEE Preparation☆181Updated 6 years ago
- ☆192Updated 7 years ago
- Collection of things made during my preparation to take on OSEE☆98Updated 5 years ago
- ☆307Updated 3 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Vulnerability examples.☆405Updated last year
- Linux Rootkits (4.x Kernel)☆83Updated 4 years ago
- Exploitation and Mitigation Slides☆127Updated last year
- Collection of resources for my preparation to take the OSEE certification.☆279Updated 4 years ago
- esoteric☆54Updated 4 years ago
- ☆83Updated 7 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆141Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆77Updated 7 years ago
- Fork of mona.py with x64dbg support☆104Updated 3 years ago
- ☆235Updated 7 years ago
- Malware dynamic instrumentation tool based on frida framework☆106Updated 5 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆63Updated 5 years ago
- x64 Windows Exploit Development☆111Updated 10 months ago
- A Binary Ninja plugin for vulnerability research.☆294Updated 9 months ago
- ☆182Updated 5 years ago
- A bunch of my exploit development helper tools, collected in one place.☆142Updated 2 years ago
- POC for cve-2019-1458☆175Updated 3 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- Hollowfind is a Volatility plugin to detect different types of process hollowing techniques used in the wild to bypass, confuse, deflect …☆137Updated 2 years ago
- collect for learning cases☆586Updated last year
- Exercise writeups from the book Practical Malware Analysis.☆227Updated last year
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆44Updated 3 years ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Write-ups for crackmes and CTF challenges☆51Updated 2 years ago