This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
☆753Nov 30, 2025Updated 4 months ago
Alternatives and similar repositories for learning-reverse-engineering
Users that are interested in learning-reverse-engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆689Jul 6, 2024Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,623Jan 13, 2024Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆174Jul 20, 2024Updated last year
- ☆137Apr 20, 2023Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Feb 8, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is a repository of resource about Malware techniques☆860Apr 8, 2023Updated 3 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 2 months ago
- A workshop about Malware Development☆1,776Jun 2, 2023Updated 2 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- Hardcore Debugging☆938Jan 6, 2026Updated 3 months ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆764Jan 26, 2025Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Nov 17, 2019Updated 6 years ago
- EDR Lab for Experimentation Purposes☆1,430Mar 1, 2026Updated last month
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆287Aug 1, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,722Mar 21, 2026Updated 2 weeks ago
- ROP-based sleep obfuscation to evade memory scanners☆380Jun 22, 2025Updated 9 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆455Feb 18, 2026Updated last month
- ☆208Mar 22, 2021Updated 5 years ago
- A tutorial on how to write a packer for Windows!☆311Dec 15, 2023Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,942Mar 26, 2026Updated 2 weeks ago
- Various ways to execute shellcode☆509Mar 13, 2024Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,078Feb 1, 2024Updated 2 years ago
- PoCs and tools for investigation of Windows process execution techniques☆955Feb 2, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Creating a repository with all public Beacon Object Files (BoFs)☆622Mar 2, 2026Updated last month
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,375Mar 4, 2026Updated last month
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,450Updated this week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,844Nov 3, 2024Updated last year
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆506Dec 19, 2023Updated 2 years ago
- ☆183Apr 24, 2025Updated 11 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆281Jun 15, 2024Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆938Jul 20, 2024Updated last year
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Create and enumerate hidden desktops.☆91Dec 12, 2023Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,868Feb 28, 2024Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Jun 11, 2025Updated 9 months ago
- TartarusGate, Bypassing EDRs☆661Jan 25, 2022Updated 4 years ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,458Oct 4, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆790Jan 26, 2026Updated 2 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago