documentations, slides decks...
☆827May 4, 2024Updated last year
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concepts (PE, PDF...)☆1,541Dec 22, 2024Updated last year
- File formats dissections and more...☆11,434Feb 18, 2024Updated 2 years ago
- scripts, etc...☆39Feb 18, 2024Updated 2 years ago
- An experimental file formats playground☆88Jun 26, 2023Updated 2 years ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆578Feb 23, 2026Updated last month
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆745Nov 1, 2024Updated last year
- Hash collisions and exploitations☆3,352Feb 20, 2025Updated last year
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,561Feb 11, 2024Updated 2 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,962Dec 9, 2021Updated 4 years ago
- Course materials for Malware Analysis by RPISEC☆4,010Aug 26, 2022Updated 3 years ago
- File formats☆975May 9, 2023Updated 2 years ago
- Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)☆2,560Dec 30, 2025Updated 3 months ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,164Nov 14, 2020Updated 5 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Apr 26, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,136Mar 8, 2026Updated last month
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,112Apr 2, 2026Updated last week
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆128Dec 3, 2022Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆631May 23, 2023Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,606Apr 7, 2026Updated last week
- Demos of various injection techniques found in malware☆792Feb 15, 2022Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,119Jul 10, 2024Updated last year
- A collection of resources for linux reverse engineering☆2,080Jun 2, 2022Updated 3 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,378Aug 8, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated last month
- This is a simple example and explanation of obfuscating API resolution via hashing☆238May 25, 2020Updated 5 years ago
- Debug Child Process Tool (auto attach)☆322Aug 11, 2023Updated 2 years ago
- Diaphora, the most advanced Free and Open Source program diffing tool.☆4,237Nov 24, 2024Updated last year
- Research code & papers from members of vx-underground.☆1,373Dec 7, 2021Updated 4 years ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,277Nov 6, 2025Updated 5 months ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆411Apr 21, 2020Updated 5 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- Linux bind shell with anti-reverse engineering techniques☆295Feb 9, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,959Apr 2, 2026Updated last week
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆416Jan 2, 2020Updated 6 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,856Feb 25, 2025Updated last year
- Reverse engineering framework in Python☆3,852Mar 26, 2026Updated 2 weeks ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,313Feb 14, 2026Updated 2 months ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆741Mar 17, 2019Updated 7 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,986Feb 24, 2025Updated last year