This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
☆760Nov 30, 2025Updated 5 months ago
Alternatives and similar repositories for learning-reverse-engineering
Users that are interested in learning-reverse-engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆693Jul 6, 2024Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,630Jan 13, 2024Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆174Jul 20, 2024Updated last year
- ☆138Apr 20, 2023Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Feb 8, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This is a repository of resource about Malware techniques☆858Apr 8, 2023Updated 3 years ago
- A proof of concept demonstrating the DLL-load proxying using undocumented Syscalls.☆413Jan 11, 2026Updated 3 months ago
- A workshop about Malware Development☆1,778Jun 2, 2023Updated 2 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- Hardcore Debugging☆937Apr 9, 2026Updated 3 weeks ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆765Jan 26, 2025Updated last year
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Nov 17, 2019Updated 6 years ago
- EDR Lab for Experimentation Purposes☆1,442Mar 1, 2026Updated 2 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning …☆287Aug 1, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,760Apr 16, 2026Updated 2 weeks ago
- ROP-based sleep obfuscation to evade memory scanners☆381Jun 22, 2025Updated 10 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆466Feb 18, 2026Updated 2 months ago
- ☆210Mar 22, 2021Updated 5 years ago
- A tutorial on how to write a packer for Windows!☆311Dec 15, 2023Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,948Updated this week
- Various ways to execute shellcode☆510Mar 13, 2024Updated 2 years ago
- Spartacus DLL/COM Hijacking Toolkit☆1,079Feb 1, 2024Updated 2 years ago
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,436Updated this week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PoCs and tools for investigation of Windows process execution techniques☆957Feb 2, 2026Updated 2 months ago
- Creating a repository with all public Beacon Object Files (BoFs)☆632Mar 2, 2026Updated last month
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,524Updated this week
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆507Dec 19, 2023Updated 2 years ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,859Nov 3, 2024Updated last year
- ☆186Apr 24, 2025Updated last year
- Slides & Code snippets for a workshop held @ x33fcon 2024☆281Jun 15, 2024Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆949Jul 20, 2024Updated last year
- Beacon Object File Loader☆293Dec 3, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Create and enumerate hidden desktops.☆91Dec 12, 2023Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,879Feb 28, 2024Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Jun 11, 2025Updated 10 months ago
- TartarusGate, Bypassing EDRs☆662Jan 25, 2022Updated 4 years ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,464Oct 4, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆792Jan 26, 2026Updated 3 months ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago