A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
☆1,573May 4, 2026Updated this week
Alternatives and similar repositories for Hacking-Windows
Users that are interested in Hacking-Windows are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,551Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆3,221Apr 13, 2026Updated 3 weeks ago
- De r/place bot voor r/PlaceNL.☆183Apr 4, 2022Updated 4 years ago
- Script to draw an image onto r/place (https://www.reddit.com/r/place/)☆889Apr 5, 2022Updated 4 years ago
- Resources for Windows exploit development☆1,653Dec 20, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Operational information regarding the Spring4Shell vulnerability in the Spring Core Framework☆175Apr 20, 2023Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,038Jul 1, 2024Updated last year
- Win32 and Kernel abusing techniques for pentesters☆978Sep 3, 2023Updated 2 years ago
- A curated list of awesome resources related to executable packing☆1,577Feb 14, 2026Updated 2 months ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆18,183Sep 10, 2025Updated 7 months ago
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆62Nov 26, 2025Updated 5 months ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆20Nov 26, 2025Updated 5 months ago
- Organized list of my malware development resources☆1,720Apr 1, 2026Updated last month
- Reverse Engineer's Toolkit☆5,190May 1, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rust Weaponization for Red Team Engagements.☆3,006Apr 25, 2024Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,384Oct 27, 2023Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,913Oct 29, 2025Updated 6 months ago
- A modern 32/64-bit position independent implant template☆1,320Mar 21, 2025Updated last year
- Offensive Software Exploitation Course☆2,514May 31, 2023Updated 2 years ago
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆1,466Oct 4, 2024Updated last year
- Research code & papers from members of vx-underground.☆1,376Dec 7, 2021Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- The swiss army knife of LSASS dumping☆2,109Sep 17, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆945Mar 29, 2022Updated 4 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆259Jul 7, 2022Updated 3 years ago
- A workshop about Malware Development☆1,779Jun 2, 2023Updated 2 years ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,325Feb 15, 2026Updated 2 months ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,213Jun 17, 2022Updated 3 years ago
- PoCs and tools for investigation of Windows process execution techniques☆957Feb 2, 2026Updated 3 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,632Jan 13, 2024Updated 2 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆765Jan 26, 2025Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆322Sep 23, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Pin Tool for tracing API calls etc☆1,651Feb 8, 2026Updated 3 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆950Jun 3, 2024Updated last year
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,500Apr 21, 2026Updated 2 weeks ago
- ☆1,812Aug 30, 2024Updated last year
- Windows System Programming Experiments☆221Jun 13, 2022Updated 3 years ago
- AV/EDR evasion via direct system calls.☆2,013Jan 1, 2023Updated 3 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆500Jan 25, 2022Updated 4 years ago