mytechnotalent / Fundamental-CPPLinks
The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.
☆18Updated 2 years ago
Alternatives and similar repositories for Fundamental-CPP
Users that are interested in Fundamental-CPP are comparing it to the libraries listed below
Sorting:
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- General malware analysis stuff☆37Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.☆28Updated 5 months ago
- Collection of my own detection rules☆20Updated 3 months ago
- ☆20Updated 3 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- bad stuffs by bad guys☆49Updated 3 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- Simple and efficient file shredding☆14Updated 6 years ago
- ☆10Updated 3 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- ☆33Updated 2 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- My malware analysis code snippets☆29Updated 2 years ago
- IDA Python scripts☆41Updated 6 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆56Updated 3 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Updated 2 years ago
- ☆24Updated 3 years ago
- ☆19Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ☆74Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 9 months ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆14Updated 3 years ago
- ☆27Updated 10 months ago
- ☆37Updated 7 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 3 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Updated 3 years ago