adwait1-g / Practical-Malware-AnalysisLinks
This repository has everything I have learnt so far while reading the book Practical Malware Analysis
☆35Updated 6 years ago
Alternatives and similar repositories for Practical-Malware-Analysis
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- x64 Windows Exploit Development☆116Updated last year
- My CTF writeups☆27Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- ☆90Updated 5 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 3 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Linux kernel internals' notes☆20Updated this week
- Malware Analysis Tools☆31Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆144Updated 3 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated last month
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- SSD Challenges☆48Updated 3 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Updated 5 years ago
- Ghidra plugin for https://analyze.intezer.com☆72Updated 3 years ago
- SLAE x86 from Pentester Academy☆14Updated 6 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆77Updated 5 years ago
- ☆28Updated 4 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆60Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- A gentle introduction to binary exploitation☆42Updated 5 years ago
- ☆37Updated 10 months ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- ☆54Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆84Updated 8 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago