jstrosch / learning-reverse-engineering
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.
☆545Updated last year
Alternatives and similar repositories for learning-reverse-engineering:
Users that are interested in learning-reverse-engineering are comparing it to the libraries listed below
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆628Updated 7 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆794Updated 9 months ago
- Collection of resources that are made by the Malware Research community☆222Updated last year
- Important notes and topics on my journey towards mastering Windows Internals☆364Updated 10 months ago
- Different learning materials☆223Updated 6 months ago
- ☆424Updated 2 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆621Updated 6 months ago
- A curated list of awesome Memory Forensics for DFIR☆396Updated last week
- Labs for Practical Malware Analysis & Triage☆935Updated last month
- Living Off The Land Drivers☆1,112Updated this week
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆307Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆940Updated last year
- Resources for learning about Exploit Development☆381Updated 4 years ago
- This is a repository of resource about Malware techniques☆783Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆650Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆679Updated last month
- ☆214Updated last year
- Hardcore Debugging☆819Updated last month
- Cybersecurity research results. Simple C/C++ and Python implementations☆206Updated this week
- A curated list of awesome reverse engineering resources for various topics☆508Updated 7 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,101Updated last month
- Dynamic unpacker based on PE-sieve☆706Updated 3 weeks ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆383Updated 4 months ago
- Research notes☆120Updated 2 months ago
- Assortment of hashing algorithms used in malware☆348Updated 2 weeks ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆382Updated 10 months ago
- A curated list of awesome malware persistence tools and resources.☆202Updated 3 months ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆1,885Updated 5 months ago
- High Octane Triage Analysis☆712Updated this week
- MBC content in markdown☆409Updated last month