keowu / Treinamento-Introducao-a-Engenharia-Reversa-no-WindowsLinks
Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.
☆17Updated 3 years ago
Alternatives and similar repositories for Treinamento-Introducao-a-Engenharia-Reversa-no-Windows
Users that are interested in Treinamento-Introducao-a-Engenharia-Reversa-no-Windows are comparing it to the libraries listed below
Sorting:
- A simple multiplatform command line search tool for Windows API.☆48Updated 10 months ago
- Multiplatform CLI and GUI tool to show information about ELF files☆63Updated 6 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- CLI program to calculate the entropy of files☆74Updated last month
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- Resources from Trend Micro Research teams☆26Updated last year
- A dynamic unpacking tool☆145Updated 2 years ago
- Exploit development challenges!☆24Updated 2 years ago
- The best theme for x64dbg!☆90Updated 3 years ago
- A command line Windows API tracing tool for Golang binaries.☆159Updated 2 years ago
- A simple C program to demonstrate a Buffer Overflow.☆12Updated 4 years ago
- 🔨 Linux Hash Cracker☆31Updated last year
- a small curation of created/stolen scripts for reverse engineering☆12Updated last year
- How to retro theme your Ghidra☆35Updated 2 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆159Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 9 months ago
- Rewrite and obfuscate code in compiled binaries☆273Updated 3 weeks ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 8 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆107Updated 3 years ago
- Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine…☆304Updated 3 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆164Updated 3 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 11 months ago
- Simple x86/x64 Assembler/Disassembler/Emulator☆188Updated 3 weeks ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆53Updated 2 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆160Updated last year
- ☆12Updated last year
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆18Updated 10 months ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated last year