malrev / ABDLinks
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
☆1,153Updated 5 years ago
Alternatives and similar repositories for ABD
Users that are interested in ABD are comparing it to the libraries listed below
Sorting:
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆898Updated 5 years ago
- A collection of pwn/CTF related utilities for Ghidra☆700Updated last year
- Scripts for the Ghidra software reverse engineering suite.☆1,115Updated 5 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆528Updated 4 years ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆738Updated last year
- An archive of low-level CTF challenges developed over the years☆644Updated 3 years ago
- A curated list of awesome Ghidra materials☆1,328Updated 4 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆731Updated 5 years ago
- Scripts and cheatsheets for IDAPython☆685Updated 2 years ago
- IDA Pro's FindCrypt ported to Ghidra, with an updated and customizable signature database☆542Updated 2 years ago
- A Coverage Explorer for Reverse Engineers☆2,446Updated last year
- Windows kernel and user mode emulation.☆1,783Updated 7 months ago
- A collection of links related to VMware escape exploits☆1,475Updated last year
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,466Updated last month
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,043Updated 2 months ago
- Use angr in Ghidra☆610Updated last year
- Proof of Concepts (PE, PDF...)☆1,529Updated 10 months ago
- A Trace Explorer for Reverse Engineers☆1,470Updated 2 years ago
- Binee: binary emulation environment☆529Updated 2 years ago
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,835Updated 8 months ago
- Virtual Machine Introspection, Tracing & Debugging☆580Updated 3 years ago
- A Course on Intermediate Level Linux Exploitation☆1,002Updated 5 years ago
- ☆800Updated 4 years ago
- ☆975Updated 2 months ago
- Automatic and platform-independent unpacker for Windows binaries based on emulation☆720Updated 2 months ago
- Vulnerability examples.☆411Updated last year
- Checksec, but for Windows: static detection of security mitigations in executables☆608Updated 10 months ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆294Updated 3 months ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,263Updated 3 weeks ago
- Automated static analysis tools for binary programs☆1,645Updated last week