Reverse Engineering Tutorials
☆526Sep 2, 2018Updated 7 years ago
Alternatives and similar repositories for reverse-engineering-tutorials
Users that are interested in reverse-engineering-tutorials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- hacking-tutorials☆360Apr 16, 2021Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,291Sep 4, 2022Updated 3 years ago
- A collection of resources for linux reverse engineering☆2,079Jun 2, 2022Updated 3 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Feb 18, 2017Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A list of Reverse Engineering articles, books, and papers☆2,661May 2, 2023Updated 2 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 5 years ago
- List of awesome reverse engineering resources☆10,014Jul 29, 2023Updated 2 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆733Apr 30, 2020Updated 5 years ago
- List of awesome penetration testing resources, tools and other shiny things☆344Jun 19, 2018Updated 7 years ago
- A collection of vulnerable ARM binaries for practicing exploit development☆945Nov 15, 2021Updated 4 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Course materials for Malware Analysis by RPISEC☆4,008Aug 26, 2022Updated 3 years ago
- Droidefense: Advance Android Malware Analysis Framework☆483Dec 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Modern tactical exploitation toolkit.☆859Mar 9, 2026Updated last month
- A tool to elevate privilege with Windows Tokens☆1,065Oct 6, 2023Updated 2 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- 🔵 Ethereum and BNB (BSC) Mev bot - Arbitrage☆364Mar 4, 2026Updated last month
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆343Nov 24, 2018Updated 7 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆909Feb 26, 2021Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,467Oct 1, 2025Updated 6 months ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆748Dec 11, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,962Dec 9, 2021Updated 4 years ago
- A curated list of awesome reversing resources☆4,481Aug 19, 2023Updated 2 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- Reverse engineering focusing on x64 Windows.☆5,800Sep 10, 2025Updated 6 months ago
- An archive of low-level CTF challenges developed over the years☆653Nov 28, 2021Updated 4 years ago
- Write ups for DRDO CTF☆10Jan 13, 2018Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,905Sep 1, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆349Mar 19, 2021Updated 5 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- INFILTRATE 2019 Demo Materials☆341Mar 17, 2023Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,225Sep 29, 2025Updated 6 months ago
- A fully functional DanderSpritz lab in 2 commands☆450May 16, 2019Updated 6 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Jul 16, 2023Updated 2 years ago
- A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware Analysis☆1,156May 31, 2023Updated 2 years ago