adwait1-g / Practical-Malware-Analysis
This repository has everything I have learnt so far while reading the book Practical Malware Analysis
☆30Updated 5 years ago
Alternatives and similar repositories for Practical-Malware-Analysis:
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below
- A repository of example plugins for Relyze Desktop.☆33Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆26Updated 4 years ago
- My solutions for random crackmes and other challenges☆11Updated 5 years ago
- ☆11Updated 4 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆15Updated 4 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 3 years ago
- Code snippets for Qiling Tutorials☆20Updated 4 years ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Updated 5 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆15Updated 5 years ago
- ☆26Updated 5 years ago
- Rootkit Arsenal 2nd Source Code☆14Updated 11 years ago
- CTFs I've played so far☆17Updated 2 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Updated 4 years ago
- A collection of anti disassembly techniques☆18Updated 7 years ago
- This is the source of our Return Oriented Programming tool.☆15Updated 5 years ago
- Rekall Memory Forensic Framework☆29Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆31Updated 4 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Simple LKM linux kernel rootkit (x86 / x86_64)☆22Updated 4 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆22Updated 5 years ago
- Debugger checks in 3 ways☆18Updated 6 years ago
- Linux kernel internals' notes☆19Updated 5 months ago