A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
☆1,560Updated this week
Alternatives and similar repositories for Hacking-Windows
Users that are interested in Hacking-Windows are comparing it to the libraries listed below
Sorting:
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,287Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆3,183May 1, 2025Updated 10 months ago
- Resources for Windows exploit development☆1,649Dec 20, 2021Updated 4 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,028Jul 1, 2024Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,858Sep 10, 2025Updated 5 months ago
- Win32 and Kernel abusing techniques for pentesters☆975Sep 3, 2023Updated 2 years ago
- A curated list of awesome resources related to executable packing☆1,542Feb 14, 2026Updated 2 weeks ago
- Reverse Engineer's Toolkit☆5,169May 1, 2025Updated 10 months ago
- Organized list of my malware development resources☆1,700May 16, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,370Oct 27, 2023Updated 2 years ago
- Offensive Software Exploitation Course☆2,392May 31, 2023Updated 2 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆936Mar 29, 2022Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆2,986Apr 25, 2024Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,899Oct 29, 2025Updated 4 months ago
- Research code & papers from members of vx-underground.☆1,352Dec 7, 2021Updated 4 years ago
- A modern 32/64-bit position independent implant template☆1,295Mar 21, 2025Updated 11 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,874Aug 18, 2023Updated 2 years ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,438Oct 4, 2024Updated last year
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,260Feb 15, 2026Updated 2 weeks ago
- PoCs and tools for investigation of Windows process execution techniques☆952Feb 2, 2026Updated last month
- The swiss army knife of LSASS dumping☆2,072Sep 17, 2024Updated last year
- A workshop about Malware Development☆1,764Jun 2, 2023Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,498Dec 21, 2023Updated 2 years ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,483Feb 16, 2026Updated 2 weeks ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated last year
- Some of my publicly available Malware analysis and Reverse engineering.☆932Jun 3, 2024Updated last year
- A Pin Tool for tracing API calls etc☆1,620Feb 8, 2026Updated 3 weeks ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Jul 7, 2022Updated 3 years ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,900Jun 27, 2023Updated 2 years ago
- some gadgets about windows process and ready to use :)☆611Oct 7, 2023Updated 2 years ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,196Jun 17, 2022Updated 3 years ago
- ☆2,168Feb 21, 2023Updated 3 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆762Jan 26, 2025Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,613Jan 13, 2024Updated 2 years ago
- AV/EDR evasion via direct system calls.☆1,990Jan 1, 2023Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,941Oct 7, 2023Updated 2 years ago
- Collection of various malicious functionality to aid in malware development☆1,841Feb 28, 2024Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,495Aug 22, 2024Updated last year
- Sandman is a NTP based backdoor for hardened networks.☆815Mar 31, 2024Updated last year