mytechnotalent / Hacking-Windows
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
☆1,364Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Hacking-Windows
- ☆500Updated 2 years ago
- a drop-in replacement for Nmap powered by shodan.io☆2,900Updated 7 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,844Updated last year
- This is a repository of resource about Malware techniques☆636Updated last year
- A workshop about Malware Development☆1,581Updated last year
- Offensive Software Exploitation Course☆2,337Updated last year
- Research code & papers from members of vx-underground.☆1,144Updated 2 years ago
- Portable Executable reversing tool with a friendly GUI☆2,750Updated last week
- Collection of various malicious functionality to aid in malware development☆1,493Updated 8 months ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆593Updated 2 years ago
- Organized list of my malware development resources☆1,430Updated 2 years ago
- Materials for Windows Malware Analysis training (volume 1)☆1,936Updated 4 months ago
- Resources for Windows exploit development☆1,518Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆2,711Updated 6 months ago
- A curated list of awesome resources related to executable packing☆1,197Updated 4 months ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,168Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆2,330Updated 10 months ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,403Updated last year
- The Havoc Framework☆6,829Updated this week
- My experiments in weaponizing Nim (https://nim-lang.org/)☆2,837Updated 5 months ago
- Win32 and Kernel abusing techniques for pentesters☆918Updated last year
- Some of my publicly available Malware analysis and Reverse engineering.☆759Updated 5 months ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,662Updated last year
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,569Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆797Updated last year
- Red Teaming Tactics and Techniques☆4,052Updated 2 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,722Updated last year
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,643Updated 10 months ago
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆824Updated 2 years ago