c3rb3ru5d3d53c / reworkshopLinks
API Hashing and String Decryption Reverse Engineering Workshop
☆20Updated 2 years ago
Alternatives and similar repositories for reworkshop
Users that are interested in reworkshop are comparing it to the libraries listed below
Sorting:
- Different learning materials☆228Updated 4 months ago
- ☆138Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆195Updated 11 months ago
- ☆299Updated 2 years ago
- Code snippets for Reverse engineering training for xtraining platform☆34Updated 3 years ago
- Research notes☆130Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆372Updated 3 years ago
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- ☆84Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆79Updated 2 years ago
- Retired TrustedSec Capabilities☆248Updated 3 weeks ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 4 months ago
- ☆156Updated 9 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- RunPE implementation with multiple evasive techniques (1)☆378Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆145Updated 10 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 3 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆65Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆136Updated 5 months ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆120Updated 2 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- A repository for additional files related to the book Windows Security Internals with PowerShell from No Starch Press.☆219Updated 5 months ago
- Collection of resources that are made by the Malware Research community☆235Updated 2 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆53Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆288Updated 6 months ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆52Updated 4 years ago