This repository has everything I have learnt so far while reading the book Practical Malware Analysis
☆35Nov 4, 2019Updated 6 years ago
Alternatives and similar repositories for Practical-Malware-Analysis
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- This is the source of our Return Oriented Programming tool.☆14Nov 8, 2019Updated 6 years ago
- A collection of useful HyperDbg scripts☆27Aug 22, 2024Updated last year
- Simple virtual machine for teaching basic concepts of virtual machine implementation.☆29Oct 29, 2019Updated 6 years ago
- Spatially explicit plant growth simulation☆11Feb 25, 2026Updated last week
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- 用于去除 Xshell7 / Xftp7 免费版本在关闭时出现的弹窗。☆10Jan 24, 2023Updated 3 years ago
- A PC/SC IFD handler to attach swICC-based cards through a software PC/SC reader.☆33Jul 24, 2024Updated last year
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- 基于tauri+vue的v2ray gui客户端☆10Apr 10, 2024Updated last year
- Data visualizations of the spread of the 2019 novel Coronavirus (COVID-19), based on data from Johns Hopkins University.☆10May 25, 2023Updated 2 years ago
- ☆38Apr 1, 2024Updated last year
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- Port of BaseFlight (with MultiWii 2.3 features) for STM32F4DISCOVERY board + GY-86 (mpu6050 + hmc5883 + ms5611) sensors board☆15Feb 3, 2014Updated 12 years ago
- gitbook!☆11Mar 6, 2019Updated 6 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- ☆11Oct 17, 2024Updated last year
- 2024年好用的IPLC VPS汇总推荐 - 高速稳定且安全的国际私用线路选择☆22Jan 11, 2025Updated last year
- ☆13Feb 26, 2025Updated last year
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- Safe VPN over SSH and Gvisor☆12Apr 17, 2024Updated last year
- Fractals using Python 3☆10Apr 9, 2021Updated 4 years ago
- Predicting Political Instability and Social Conflicts Using Multimodal Data☆10Jun 6, 2016Updated 9 years ago
- This repository provides examples that demonstrates how to develop PSoC 4 MCU based analog designs. These examples help you to use periph…☆15Oct 27, 2018Updated 7 years ago
- How to build a security camera with a Raspberry Pi☆10Feb 24, 2026Updated last week
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- Prometheus exporter for Amazon Smart Air Quality Monitor☆12Jan 21, 2022Updated 4 years ago
- Configuration files for modifying the official Arduino IDE to program Trinket/Pro Trinket/Gemma/Flora on Linux.☆11Jan 24, 2019Updated 7 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- ebhttps是首款基于eBPF革命性技术的开源web应用防火墙,最大的优点是零配置、不需要导入SSL证书、不中断生产环境等。☆12Jun 6, 2025Updated 8 months ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- ☆14Apr 16, 2020Updated 5 years ago
- ☆10Dec 2, 2023Updated 2 years ago
- Java Based crypto-tool☆15Updated this week
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- ☆11Feb 19, 2024Updated 2 years ago