gabimarti / crackmes-solutionsLinks
Solutions to some crackmes that I have done.
☆70Updated 2 years ago
Alternatives and similar repositories for crackmes-solutions
Users that are interested in crackmes-solutions are comparing it to the libraries listed below
Sorting:
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- A curated list of awesome Windows Exploitation resources, and shiny things.☆78Updated 7 years ago
- Initiative to collect and preserve crackmes for learning and practice in reverse engineering☆108Updated 3 years ago
- My notes while studying Windows exploitation☆188Updated last year
- ☆84Updated 7 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆79Updated 2 years ago
- A dynamic unpacking tool☆137Updated last year
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated last month
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆124Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆145Updated 2 years ago
- ☆50Updated 6 years ago
- A comprehensive Hypervisor resources repo☆115Updated this week
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆105Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆106Updated last year
- Batch script to compile a binary shellcode blob into an exe file☆86Updated 6 years ago
- ☆73Updated last year
- ☆55Updated 3 years ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆82Updated 2 months ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆148Updated 2 years ago
- reverse engninering & pwn writeup☆24Updated 4 years ago
- ☆28Updated 2 years ago
- MalUnpack companion driver☆98Updated last year
- Simple API Hooks detector☆73Updated 2 years ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆62Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆225Updated 2 years ago
- Anti-reverse Compilation☆34Updated 4 years ago
- API Logger for Windows Executables☆78Updated 4 years ago