This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.
☆63Feb 8, 2022Updated 4 years ago
Alternatives and similar repositories for Malware-Reverse-Engineering-for-Beginners
Users that are interested in Malware-Reverse-Engineering-for-Beginners are comparing it to the libraries listed below
Sorting:
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆94Dec 2, 2025Updated 3 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- Real Android malware apps discussed in the book☆46Oct 12, 2023Updated 2 years ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆30May 23, 2025Updated 9 months ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆745Nov 30, 2025Updated 3 months ago
- IDA Terminal☆17Feb 27, 2026Updated 3 weeks ago
- ☆28Feb 7, 2021Updated 5 years ago
- ☆21Aug 19, 2017Updated 8 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Portable download of Microsoft Visual C++ 4.00 command line tools. Just run bin/VCVARS32.bat in any command prompt.☆14Nov 2, 2021Updated 4 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Remote persistent 🔑Logger for Windows and Linux☆295Apr 21, 2023Updated 2 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- Signature libraries for Binary Ninja☆16Mar 18, 2020Updated 6 years ago
- ☆18Mar 26, 2024Updated last year
- ☆19Jul 29, 2022Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- ☆26Apr 10, 2023Updated 2 years ago
- A Virtual World Platform for the future☆10Nov 13, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆10Oct 1, 2023Updated 2 years ago
- pwndbg configuration to use tmux panes☆14Jan 15, 2025Updated last year
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Python3 script which decrypts files encrypted by flawed Cl0p ELF variant.☆17Feb 6, 2023Updated 3 years ago
- Assembly of random tutorials, that can be referenced in videos and YT comments☆16Mar 10, 2026Updated last week
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆10Feb 5, 2024Updated 2 years ago