msayyad / RE_Mal_Exploit_Tutorials
my reading list for reverse engineering malware & exploit development
☆12Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for RE_Mal_Exploit_Tutorials
- x64 Windows Exploit Development☆109Updated 2 months ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆45Updated 4 years ago
- Linux Rootkits (4.x Kernel)☆83Updated 3 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Mastering Malware Analysis, published by Packt☆37Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆56Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- Malware Analysis Tools☆29Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 2 years ago
- RWX CTF Team Writeups☆10Updated 4 years ago
- Exploits made practicing for OSCE☆22Updated 3 years ago
- Collection of windows rootkits☆25Updated 4 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆47Updated 7 months ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆39Updated 2 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆57Updated 4 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆78Updated 10 months ago
- ☆47Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 3 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Updated 6 years ago
- Revers3c-Team CTF writeups☆21Updated 5 years ago
- Red Team Operator: Malware Development Essentials Course☆92Updated 4 years ago