keowu / Treinamento-Introducao-a-Engenharia-Reversa-no-WindowsLinks
Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.
☆14Updated 3 years ago
Alternatives and similar repositories for Treinamento-Introducao-a-Engenharia-Reversa-no-Windows
Users that are interested in Treinamento-Introducao-a-Engenharia-Reversa-no-Windows are comparing it to the libraries listed below
Sorting:
- A simple multiplatform command line search tool for Windows API.☆48Updated 7 months ago
- Multiplatform CLI and GUI tool to show information about ELF files☆60Updated 3 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- 🔨 Linux Hash Cracker☆31Updated last year
- A simple C program to demonstrate a Buffer Overflow.☆12Updated 4 years ago
- Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine…☆250Updated this week
- The best theme for x64dbg!☆89Updated 3 years ago
- Simple x86/x64 Assembler/Disassembler/Emulator☆185Updated last year
- A simple plugin for working with Swift Strings, optimized Swift Strings, and Swift Arrays during the reverse engineering of iOS binaries …☆17Updated 4 months ago
- Exploit development challenges!☆24Updated 2 years ago
- a small curation of created/stolen scripts for reverse engineering☆12Updated last year
- A dynamic unpacking tool☆141Updated 2 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆154Updated last year
- PE Injector - Inject code on 32-bit and 64-bit PE executables☆33Updated 4 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Updated 9 months ago
- CLI program to calculate the entropy of files☆73Updated last year
- Rewrite and obfuscate code in compiled binaries☆259Updated last month
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆19Updated 7 months ago
- ☆24Updated 11 months ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 5 months ago
- x86/x64 Ring 0/-2 System Freezer/Debugger☆119Updated 4 months ago
- 🧛🏻♂️ Dark theme for IDA Pro☆60Updated 2 months ago
- Resources from Trend Micro Research teams☆26Updated 11 months ago
- A command line Windows API tracing tool for Golang binaries.☆157Updated last year
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆51Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆84Updated 7 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆98Updated 2 years ago
- RISC-V Virtual Machine☆253Updated 4 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆156Updated last year