documentations, slides decks...
☆831May 4, 2024Updated 2 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concepts (PE, PDF...)☆1,542Dec 22, 2024Updated last year
- File formats dissections and more...☆11,448Feb 18, 2024Updated 2 years ago
- scripts, etc...☆39Feb 18, 2024Updated 2 years ago
- An experimental file formats playground☆89Jun 26, 2023Updated 2 years ago
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆578Feb 23, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆748Nov 1, 2024Updated last year
- Hash collisions and exploitations☆3,356Feb 20, 2025Updated last year
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,568Feb 11, 2024Updated 2 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,967Dec 9, 2021Updated 4 years ago
- Course materials for Malware Analysis by RPISEC☆4,019Aug 26, 2022Updated 3 years ago
- File formats☆978Apr 15, 2026Updated 2 weeks ago
- Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)☆2,578Dec 30, 2025Updated 4 months ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,164Nov 14, 2020Updated 5 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Apr 26, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,148Apr 15, 2026Updated 2 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,121Apr 2, 2026Updated last month
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆128Dec 3, 2022Updated 3 years ago
- Quickly debug shellcode extracted during malware analysis☆634May 23, 2023Updated 2 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,646Apr 18, 2026Updated 2 weeks ago
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- A VBA parser and emulation engine to analyze malicious macros.☆1,120Jul 10, 2024Updated last year
- A collection of resources for linux reverse engineering☆2,081Jun 2, 2022Updated 3 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,379Aug 8, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated 2 months ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆238May 25, 2020Updated 5 years ago
- Debug Child Process Tool (auto attach)☆324Aug 11, 2023Updated 2 years ago
- Diaphora, the most advanced Free and Open Source program diffing tool.☆4,252Nov 24, 2024Updated last year
- Research code & papers from members of vx-underground.☆1,376Dec 7, 2021Updated 4 years ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,285Nov 6, 2025Updated 5 months ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 6 years ago
- Conference slides and White-papers☆360Jan 3, 2020Updated 6 years ago
- Linux bind shell with anti-reverse engineering techniques☆295Feb 9, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,989Updated this week
- Papers, blogposts, tutorials etc for learning about Windows kernel exploitation, internals and (r|b)ootkits☆416Jan 2, 2020Updated 6 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,856Feb 25, 2025Updated last year
- Reverse engineering framework in Python☆3,864Mar 26, 2026Updated last month
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,326Feb 14, 2026Updated 2 months ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆740Mar 17, 2019Updated 7 years ago
- Defund the Police.☆13,702Jun 7, 2024Updated last year