jstrosch / learning-reverse-engineering
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
☆556Updated last year
Alternatives and similar repositories for learning-reverse-engineering:
Users that are interested in learning-reverse-engineering are comparing it to the libraries listed below
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆636Updated 10 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆808Updated 11 months ago
- Collection of resources that are made by the Malware Research community☆225Updated last year
- Different learning materials☆226Updated last month
- ☆437Updated 2 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆376Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆319Updated last month
- Resources for learning about Exploit Development☆389Updated 4 years ago
- A curated list of awesome Memory Forensics for DFIR☆431Updated 2 months ago
- Research notes☆123Updated 5 months ago
- Labs for Practical Malware Analysis & Triage☆965Updated last month
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆197Updated 2 months ago
- Pure Malware Development Resource Collections☆278Updated 4 months ago
- ⚠️ malware development☆541Updated 11 months ago
- ☆227Updated last year
- Cybersecurity research results. Simple C/C++ and Python implementations☆222Updated last week
- Living Off The Land Drivers☆1,160Updated last month
- This is a repository of resource about Malware techniques☆796Updated 2 years ago
- Hardcore Debugging☆875Updated 2 weeks ago
- A curated list of awesome malware analysis tools and resources☆79Updated 3 years ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,242Updated this week
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆658Updated last year
- Reverse Engineering and Malware Analysis Roadmap☆136Updated last week
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆348Updated 8 months ago
- Assortment of hashing algorithms used in malware☆360Updated last month
- Win32 and Kernel abusing techniques for pentesters☆949Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆703Updated 3 months ago
- Dynamic unpacker based on PE-sieve☆730Updated last month
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆107Updated 6 years ago
- Centralized resource for listing and organizing known injection techniques and POCs☆475Updated 2 weeks ago