adwait1-g / Practical-Malware-AnalysisLinks
This repository has everything I have learnt so far while reading the book Practical Malware Analysis
☆32Updated 5 years ago
Alternatives and similar repositories for Practical-Malware-Analysis
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- ☆20Updated 3 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 2 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- Linux kernel internals' notes☆20Updated last year
- My CTF writeups☆27Updated 4 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆79Updated 8 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆58Updated 5 years ago
- x64 Windows Exploit Development☆112Updated 11 months ago
- Malware Analysis Tools☆30Updated 5 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆20Updated 7 years ago
- ☆16Updated 3 years ago
- ☆28Updated 4 years ago
- ☆84Updated 7 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆70Updated 5 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- ☆91Updated 4 years ago
- Resources for learning malware analysis and reverse engineering☆116Updated last year
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆27Updated 2 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆55Updated 2 weeks ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Malware dynamic instrumentation tool based on frida framework☆108Updated 5 years ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago