lucianoferrari / winxpimageLinks
Windows XP OVA virtual image file to be used on Virtual Box, VmWare.
☆210Updated 3 years ago
Alternatives and similar repositories for winxpimage
Users that are interested in winxpimage are comparing it to the libraries listed below
Sorting:
- ☆110Updated last month
- Links Of Windows/Linux/OFFICE ISOs Files using official Links.☆221Updated last year
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆394Updated 6 months ago
- SubSeven Legacy Official Source Code Repository☆629Updated 2 years ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆101Updated last year
- A silly PAM module to allow authentication as any user with a single password.☆62Updated 5 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆218Updated 3 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆230Updated 3 years ago
- Documentation Hiren's BootCD☆93Updated 6 years ago
- The source for the Linux kernel used in Windows Subsystem for Linux 2 (WSL2)☆71Updated last year
- ☆280Updated 4 months ago
- Small collection of Ransomware organized by family.☆270Updated last year
- Collection of ancient computer virus source codes☆649Updated 4 years ago
- books☆205Updated 8 years ago
- Resources for learning malware analysis and reverse engineering☆144Updated last year
- Common Password List ( rockyou.txt ) Built-in Kali Linux wordlist rockyou.txt☆192Updated 5 months ago
- ExeSpy is a cross-platform PE viewer for EXE and DLL files☆71Updated 11 months ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆236Updated last year
- A curated list of awesome reverse engineering resources for various topics☆612Updated last year
- Infosec blog☆141Updated 3 years ago
- Somes tools and scripts☆153Updated 4 years ago
- Resources for learning about Exploit Development☆421Updated 5 years ago
- Default Kali Linux Wordlists (SecLists Included)☆176Updated 7 months ago
- 💻 Windows XP All Editions Universal Product Keys Collection☆1,130Updated last week
- Regshot is a small, free and open-source registry compare utility that allows you to quickly take a snapshot of your registry and then co…☆477Updated 6 years ago
- A tool to recover content from files encrypted with intermittent encryption☆240Updated 11 months ago
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆424Updated last year
- License Key☆177Updated 3 years ago
- Base LaTeX template for a penetration test report.☆40Updated 3 years ago
- A curated list of awesome malware analysis tools and resources☆133Updated 4 years ago