nanabingies / Practical-Reverse-Engineering-Solutions
Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1st Edition by Bruce Dang
☆14Updated last year
Alternatives and similar repositories for Practical-Reverse-Engineering-Solutions:
Users that are interested in Practical-Reverse-Engineering-Solutions are comparing it to the libraries listed below
- ☆33Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 9 months ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- Reverse Engineering and Debugging Malware☆30Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- OFFZONE 2024 Malware Persistence workshop☆19Updated 3 months ago
- ☆71Updated last year
- ☆32Updated last year
- Collection of various WINAPI tricks / features used or abused by Malware☆14Updated 3 years ago
- ☆28Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- ☆26Updated 4 months ago
- ☆16Updated last month
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆10Updated 2 years ago
- Code samples that serve as references for Windows API functions☆30Updated 10 months ago
- ☆44Updated last year
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆52Updated 3 months ago
- ☆48Updated last year
- IDA Python scripts☆34Updated this week
- ☆18Updated 2 months ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆16Updated 7 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 6 months ago
- A payload delivery system which embeds payloads in an executable's icon file!☆72Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- docker-compose to deploy CTFd w/ ghidragolf configurations☆12Updated 2 years ago