malrev / ABDLinks
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
☆1,137Updated 4 years ago
Alternatives and similar repositories for ABD
Users that are interested in ABD are comparing it to the libraries listed below
Sorting:
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆900Updated 5 years ago
- A collection of pwn/CTF related utilities for Ghidra☆688Updated 11 months ago
- DEFCON 27 workshop - Modern Debugging with WinDbg Preview☆734Updated 9 months ago
- Scripts and cheatsheets for IDAPython☆685Updated last year
- Scripts for the Ghidra software reverse engineering suite.☆1,101Updated 4 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆527Updated 4 years ago
- An archive of low-level CTF challenges developed over the years☆641Updated 3 years ago
- A curated list of awesome Ghidra materials☆1,286Updated 3 years ago
- A Trace Explorer for Reverse Engineers☆1,452Updated last year
- A Coverage Explorer for Reverse Engineers☆2,399Updated last year
- Binee: binary emulation environment☆526Updated 2 years ago
- IDA Pro's FindCrypt ported to Ghidra, with an updated and customizable signature database☆540Updated 2 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆725Updated 5 years ago
- A collection of links related to VMware escape exploits☆1,455Updated 11 months ago
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,416Updated last year
- Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free…☆1,820Updated 6 months ago
- A Course on Intermediate Level Linux Exploitation☆1,000Updated 5 years ago
- Proof of Concepts (PE, PDF...)☆1,522Updated 8 months ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆1,994Updated 2 months ago
- ☆800Updated 4 years ago
- Use angr in Ghidra☆605Updated last year
- Windows kernel and user mode emulation.☆1,740Updated 4 months ago
- Virtual Machine Introspection, Tracing & Debugging☆584Updated 3 years ago
- Automated static analysis tools for binary programs☆1,625Updated this week
- List of Awesome Advanced Windows Exploitation References☆1,512Updated 3 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆784Updated 9 months ago
- ☆871Updated last week
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Updated last year
- Vulnerability examples.☆408Updated last year
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆296Updated 3 weeks ago