nanabingies / Practical-Reverse-Engineering-SolutionsLinks
Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1st Edition by Bruce Dang
☆14Updated 2 years ago
Alternatives and similar repositories for Practical-Reverse-Engineering-Solutions
Users that are interested in Practical-Reverse-Engineering-Solutions are comparing it to the libraries listed below
Sorting:
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Updated 3 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated last month
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated last year
- An Xdbg Plugin of the ERC Library.☆26Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Updated last year
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Updated 3 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 6 months ago
- ☆59Updated 4 years ago
- A dynamic unpacking tool☆145Updated 2 years ago
- A collection of PoCs for different injection techniques on Windows!☆49Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆82Updated 3 years ago
- ☆49Updated 2 years ago
- ☆33Updated 3 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆128Updated 11 months ago
- Persistence techniques for windows.☆19Updated 2 years ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆36Updated 3 years ago
- My notes while studying Windows exploitation☆193Updated 2 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- General malware analysis stuff☆37Updated last year
- A solution to create obfuscated download cradles for PowerShell.☆16Updated 3 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated 2 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆137Updated this week
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 7 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 4 years ago