malrev / ABDLinks
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
☆1,112Updated 4 years ago
Alternatives and similar repositories for ABD
Users that are interested in ABD are comparing it to the libraries listed below
Sorting:
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆896Updated 5 years ago
- A curated list of awesome Ghidra materials☆1,264Updated 3 years ago
- A collection of pwn/CTF related utilities for Ghidra☆680Updated 8 months ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆723Updated 5 years ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,947Updated 2 weeks ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆723Updated 7 months ago
- A Coverage Explorer for Reverse Engineers☆2,364Updated 10 months ago
- Scripts for the Ghidra software reverse engineering suite.☆1,080Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,432Updated 8 months ago
- Scripts and cheatsheets for IDAPython☆683Updated last year
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,800Updated 3 months ago
- Use angr in Ghidra☆584Updated 10 months ago
- A Trace Explorer for Reverse Engineers☆1,409Updated last year
- Windows kernel and user mode emulation.☆1,658Updated 2 months ago
- Binee: binary emulation environment☆520Updated 2 years ago
- Virtual Machine Introspection, Tracing & Debugging☆578Updated 3 years ago
- Project Zero Docs and Tools☆769Updated 3 weeks ago
- Deep ghidra decompiler and sleigh disassembler integration for rizin☆874Updated last month
- An archive of low-level CTF challenges developed over the years☆633Updated 3 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆528Updated 4 years ago
- IDA Pro utilities from FLARE team☆2,339Updated 7 months ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,668Updated 3 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,323Updated last week
- ☆845Updated 7 months ago
- List of Awesome Advanced Windows Exploitation References☆1,493Updated 3 years ago
- A Course on Intermediate Level Linux Exploitation☆1,003Updated 4 years ago
- IDA Pro's FindCrypt ported to Ghidra, with an updated and customizable signature database☆537Updated last year
- A Pin Tool for tracing API calls etc☆1,439Updated last month
- Public API, examples, documentation and issues for Binary Ninja☆1,040Updated this week
- ☆792Updated 4 years ago