msayyad / RE_Mal_Exploit_Tutorials
my reading list for reverse engineering malware & exploit development
☆13Updated 4 months ago
Alternatives and similar repositories for RE_Mal_Exploit_Tutorials
Users that are interested in RE_Mal_Exploit_Tutorials are comparing it to the libraries listed below
Sorting:
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆98Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆43Updated 2 years ago
- Malware Analysis Tools☆30Updated 5 years ago
- x64 Windows Exploit Development☆111Updated 8 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- Exploits made practicing for OSCE☆23Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆48Updated 2 weeks ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 2 years ago
- ☆49Updated 2 years ago
- ☆21Updated 6 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆25Updated 4 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Python, C++ and Go☆23Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 4 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- ☆83Updated 7 years ago
- ☆55Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆70Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆74Updated 7 years ago
- Just another collection of links, tools, reports and other stuff☆24Updated 3 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago