nanabingies / Practical-Reverse-Engineering-SolutionsLinks
Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1st Edition by Bruce Dang
☆14Updated 2 years ago
Alternatives and similar repositories for Practical-Reverse-Engineering-Solutions
Users that are interested in Practical-Reverse-Engineering-Solutions are comparing it to the libraries listed below
Sorting:
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated last month
- An Xdbg Plugin of the ERC Library.☆26Updated 2 years ago
- ☆59Updated 4 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ☆44Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated 2 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 6 months ago
- A dynamic unpacking tool☆145Updated 2 years ago
- Bypass UAC on Windows 10/11 x64 using ms-settings DelegateExecute registry key.☆82Updated 3 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆30Updated last year
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Updated 5 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 3 years ago
- ☆12Updated 5 years ago
- Windows internals and exploitation tricks☆112Updated 2 months ago
- Persistence techniques for windows.☆19Updated 2 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Updated 5 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Updated 3 years ago
- ☆33Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Bypass Malware Time Delays☆108Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated last year
- General malware analysis stuff☆37Updated last year
- ☆18Updated last year
- This is a simple example of DLL hijacking enabling proxy execution.☆70Updated 2 years ago
- My notes while studying Windows exploitation☆193Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆35Updated 2 years ago