nanabingies / Practical-Reverse-Engineering-Solutions
Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1st Edition by Bruce Dang
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Practical-Reverse-Engineering-Solutions
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 5 months ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆59Updated 2 years ago
- Here are some of my malware reversing papers that I will be publishing☆31Updated 2 years ago
- Collection of my own detection rules☆14Updated 9 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆27Updated last month
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆39Updated 4 years ago
- ☆33Updated last year
- An Xdbg Plugin of the ERC Library.☆26Updated 9 months ago
- ☆14Updated 2 weeks ago
- ☆12Updated 4 years ago
- ☆49Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆49Updated last year
- ☆43Updated last year
- Persistence techniques for windows.☆19Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 2 months ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Updated 2 years ago
- ☆52Updated 2 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- CVE-2018-6066 using VBA☆64Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆32Updated last year
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 3 years ago
- An x64dbg plugin which marks XFG call signatures as data☆72Updated last year
- Recon 2023 slides and code☆79Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆80Updated 9 months ago
- ☆27Updated 3 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆50Updated 2 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆9Updated 2 years ago
- ☆34Updated last year
- Windows 11 Syscall table. Ready to use in direct syscall. Actively maintained.☆19Updated 2 years ago