c3rb3ru5d3d53c / reworkshopLinks
API Hashing and String Decryption Reverse Engineering Workshop
☆22Updated last year
Alternatives and similar repositories for reworkshop
Users that are interested in reworkshop are comparing it to the libraries listed below
Sorting:
- ☆136Updated 2 years ago
- ☆80Updated 6 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Different learning materials☆225Updated 2 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆144Updated 10 months ago
- A ProcessMonitor visualization application written in rust.☆180Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 5 months ago
- The most average C2 ever (MACE)☆96Updated 3 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated last year
- ☆277Updated last year
- ☆303Updated 6 months ago
- Retired TrustedSec Capabilities☆246Updated 6 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- Tools for analyzing EDR agents☆228Updated 11 months ago
- ☆119Updated last year
- ☆100Updated 6 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆79Updated 9 months ago
- Apply a divide and conquer approach to bypass EDRs☆280Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆70Updated last year
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- ☆132Updated last year
- ☆85Updated 2 years ago
- Research notes☆125Updated 6 months ago
- Completely Risky Active-Directory Simulation Hub☆100Updated last year