c3rb3ru5d3d53c / reworkshop
API Hashing and String Decryption Reverse Engineering Workshop
☆22Updated last year
Alternatives and similar repositories for reworkshop:
Users that are interested in reworkshop are comparing it to the libraries listed below
- ☆136Updated 2 years ago
- ☆80Updated 5 months ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆142Updated 9 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 3 months ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- QuoteDB (Vulnerable TCP Server)☆70Updated last year
- A series of writes about “Binary Exploitation”.☆85Updated last year
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆28Updated last year
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Updated 3 years ago
- Retired TrustedSec Capabilities☆247Updated 5 months ago
- A collection of tools, scripts and personal research☆128Updated 2 weeks ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated 8 months ago
- A curated list of resources for the OSED journey.☆62Updated 3 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 10 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆160Updated 3 weeks ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆182Updated last year
- Jupyter Notebooks for the Blue Team☆145Updated last month
- Creation of a laboratory for malware analysis in AWS☆95Updated 2 years ago