Reverse Engineering 101 training from our Vulnerability Researcher Development Program (VRDP)
☆66Jan 13, 2026Updated last month
Alternatives and similar repositories for VRDP-RE-101
Users that are interested in VRDP-RE-101 are comparing it to the libraries listed below
Sorting:
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- A simple C++ driver base with KD data block☆11Jun 25, 2022Updated 3 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14May 26, 2022Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆20Sep 1, 2022Updated 3 years ago
- ☆59Jun 8, 2022Updated 3 years ago
- WebKit/JSC CodeQL Databases☆17Dec 15, 2025Updated 2 months ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Aug 11, 2023Updated 2 years ago
- Decoder for VMProtect hwids☆18Aug 1, 2022Updated 3 years ago
- Binary Ninja plugin to perform automated analysis of Windows drivers☆20Aug 8, 2019Updated 6 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- My try to implement a virtual CPU in C☆19Nov 18, 2023Updated 2 years ago
- Hopefully an insightful XPC tracer that helps vulerability research by tracing server and client call stacks☆20Jul 19, 2022Updated 3 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Official Malice Plugins☆21Nov 26, 2018Updated 7 years ago
- ☆21Dec 25, 2024Updated last year
- ☆43Apr 18, 2023Updated 2 years ago
- Automated JavaScript Debugging Tool using CDP - Automatically sets breakpoints for specified strings/patterns in JavaScript code☆96Dec 22, 2024Updated last year
- ☆51Mar 9, 2022Updated 3 years ago
- Corsair LL Access driver abuse☆24Apr 16, 2021Updated 4 years ago
- ida utilities / plugins / scripts☆80Jan 29, 2026Updated last month
- Exploit for CVE-2023-32364☆22Sep 26, 2023Updated 2 years ago
- ☆26Oct 29, 2021Updated 4 years ago
- ScrapeAW is a framework that without API scrape IPs across the world using Shodan☆11May 16, 2024Updated last year
- A cross-platform C++ framework for building Windows shellcode☆158Updated this week
- Utility functions for building Windows kernel drivers in Rust☆21Nov 16, 2021Updated 4 years ago
- Bypassing kernel patch protection runtime☆22Feb 19, 2023Updated 3 years ago
- Extreme Vulnerable IOKit driver☆93Jan 23, 2021Updated 5 years ago
- WTF Snapshot fuzzing of macOS targets☆98May 31, 2024Updated last year
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- ☆25Jul 11, 2022Updated 3 years ago
- My collection of PoCs☆26Nov 9, 2023Updated 2 years ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- A Python library for the ipsw daemon API☆27Aug 14, 2023Updated 2 years ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆122Dec 23, 2025Updated 2 months ago
- Automated environment setup for Bootkit & Rootkit development.☆36Aug 9, 2025Updated 6 months ago