This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.
☆63Feb 8, 2022Updated 4 years ago
Alternatives and similar repositories for Malware-Reverse-Engineering-for-Beginners
Users that are interested in Malware-Reverse-Engineering-for-Beginners are comparing it to the libraries listed below
Sorting:
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 2 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Dec 5, 2023Updated 2 years ago
- ☆28Feb 7, 2021Updated 5 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- Smali Source code interpreter + visitor API in Python3 and an emulator to execute code snippets.☆30May 23, 2025Updated 9 months ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- Real Android malware apps discussed in the book☆46Oct 12, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- ☆20Aug 19, 2017Updated 8 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- DRSource is an extensible, multi-language static analysis tool designed to detect vulnerabilities in source code. It uses a pluggable arc…☆14Updated this week
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- Released alongside with a talk at REcon 2023, TheRestarter is an interactive command-line tool is designed to interact with the Windows …☆15Jun 8, 2023Updated 2 years ago
- bypassing the twitter safety link firewall :)☆12May 4, 2025Updated 9 months ago
- ARC4 (Alleged RC4) cryptography provider class library.☆10Dec 15, 2024Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆12May 26, 2024Updated last year
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆10Feb 5, 2024Updated 2 years ago
- A Binary Ninja plugin that automatically resolves type information for EFI protocol usage.☆37Jul 25, 2025Updated 7 months ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆738Nov 30, 2025Updated 3 months ago