keowu / Treinamento-Introducao-a-Engenharia-Reversa-no-WindowsLinks
Conteúdo do treinamento/brainstorming Introdução a engenharia reversa no Windows feito com muito carinho por mim.
☆17Updated 3 years ago
Alternatives and similar repositories for Treinamento-Introducao-a-Engenharia-Reversa-no-Windows
Users that are interested in Treinamento-Introducao-a-Engenharia-Reversa-no-Windows are comparing it to the libraries listed below
Sorting:
- Multiplatform CLI and GUI tool to show information about ELF files☆63Updated 7 months ago
- A simple multiplatform command line search tool for Windows API.☆48Updated 10 months ago
- CLI program to calculate the entropy of files☆74Updated 2 months ago
- A dynamic unpacking tool☆145Updated 2 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆127Updated 2 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15Updated 3 years ago
- 🔨 Linux Hash Cracker☆31Updated last year
- ☆24Updated last year
- Simple x86/x64 Assembler/Disassembler/Emulator☆190Updated last month
- Exploit development challenges!☆24Updated 2 years ago
- The best theme for x64dbg!☆91Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆161Updated 2 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 9 months ago
- A simple C program to demonstrate a Buffer Overflow.☆12Updated 4 years ago
- A command line Windows API tracing tool for Golang binaries.☆159Updated 2 years ago
- a small curation of created/stolen scripts for reverse engineering☆12Updated last year
- I/O Cache-As-Ram + AMD x86_64 cache line locking | Mirror of https://codeberg.org/3itch/icekit☆18Updated 10 months ago
- Resources from Trend Micro Research teams☆26Updated last year
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆165Updated 3 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine…☆316Updated 3 months ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Updated last year
- MalUnpack companion driver☆99Updated last year
- Small tool to convert beteween the PE alignments (raw and virtual).☆109Updated 3 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆128Updated 11 months ago
- ☆122Updated 3 weeks ago
- My notes while studying Windows exploitation☆193Updated 2 years ago