ring0-c0d3-br34k3r / RE-MA-Roadmap
Reverse Engineering and Malware Analysis Roadmap
☆45Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for RE-MA-Roadmap
- BSides Prishtina 2024 Malware Development and Persistence workshop☆61Updated 3 weeks ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆43Updated 2 months ago
- ☆39Updated 9 months ago
- Full exploit chain for Faronics-DeepFreeze-8☆3Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆57Updated 9 months ago
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆62Updated 2 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆66Updated 7 months ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆54Updated 7 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆63Updated 2 months ago
- Payload encoding utility to effectively lower payload entropy.☆99Updated this week
- ☆124Updated 3 weeks ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 4 years ago
- Make an Linux Kernel rootkit visible again.☆43Updated last month
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆70Updated 8 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆32Updated 3 months ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆125Updated 5 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆90Updated 10 months ago
- Reverse Shell - technique is commonly used in cyber attacks☆15Updated 8 months ago
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆171Updated 3 weeks ago
- Analyse MSI files for vulnerabilities☆109Updated 2 months ago
- A bunch of scripts and code i wrote.☆131Updated 2 weeks ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆124Updated 8 months ago
- CVE-2024-30090 - LPE PoC☆93Updated last month
- ☆24Updated last week