c3rb3ru5d3d53c / reworkshop
API Hashing and String Decryption Reverse Engineering Workshop
☆21Updated last year
Related projects ⓘ
Alternatives and complementary repositories for reworkshop
- ☆130Updated last year
- Free training course offered at Hack Space Con 2023☆132Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- ☆76Updated 5 months ago
- Different learning materials☆215Updated 2 months ago
- Code snippets for Reverse engineering training for xtraining platform☆32Updated last year
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆124Updated 3 months ago
- Completely Risky Active-Directory Simulation Hub☆99Updated 11 months ago
- A curated list of resources for the OSED journey.☆56Updated 2 years ago
- ☆94Updated 2 months ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆65Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆171Updated 9 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- ☆103Updated 4 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆116Updated 4 months ago
- Jupyter Notebooks for the Blue Team☆141Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- Retired TrustedSec Capabilities☆225Updated last month
- The most average C2 ever (MACE)☆96Updated 2 years ago
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- A repository for additional files related to the book Windows Security Internals with PowerShell from No Starch Press.☆128Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆55Updated last month
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆71Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆88Updated 3 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆103Updated 2 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated last month
- ☆82Updated 2 years ago
- https://lolad-project.github.io/☆53Updated last week