ayoubfaouzi / software-engineering-notes
My software engineering notes.
☆17Updated 3 weeks ago
Alternatives and similar repositories for software-engineering-notes:
Users that are interested in software-engineering-notes are comparing it to the libraries listed below
- ☆18Updated 5 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Practical Reverse Engineering book exercises☆9Updated 3 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆15Updated 5 years ago
- A set of small utilities, helpers for PIN tracers☆31Updated last year
- An example of Windows self-replicating malware.☆10Updated 2 years ago
- ☆28Updated 3 months ago
- Collection of IDA helpers☆15Updated 2 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆32Updated 4 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 8 years ago
- Decrypt Wireless Passwords On Windows☆13Updated 4 years ago
- Personal notes☆10Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- ☆17Updated 6 years ago
- Slides from various conference talks☆36Updated last year
- Attack tool for altering packed samples so that they evade static packing detection☆14Updated 3 weeks ago
- Signature finder (from PE-bear)☆31Updated 8 months ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆12Updated 2 years ago
- Overwrite MBR and add own custom message☆15Updated 4 years ago
- Go library to parse Executable and Linkable Format (ELF) files.☆44Updated 7 months ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆58Updated 6 months ago
- ☆33Updated 3 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Updated 4 years ago
- Debugger checks in 3 ways☆18Updated 7 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 5 years ago