Basics of Reverse Engineering Winter 2022
☆29Mar 11, 2022Updated 3 years ago
Alternatives and similar repositories for RE-basics-W22
Users that are interested in RE-basics-W22 are comparing it to the libraries listed below
Sorting:
- ☆16Dec 14, 2017Updated 8 years ago
- A common set of helpers used across VTIL toolchain. Moved into -->☆21May 2, 2020Updated 5 years ago
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated last month
- ☆18Aug 14, 2019Updated 6 years ago
- A simple example application to collect DNS queries logs using etw-api☆27May 11, 2020Updated 5 years ago
- BYOVD collection☆24Mar 20, 2024Updated last year
- RPC Monitor based on The ETW Microsoft-Windows-Rpc provider☆24Mar 22, 2020Updated 5 years ago
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Symbolic expression simplifier used across VTIL toolchain. Moved into -->☆25May 2, 2020Updated 5 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆58Sep 15, 2025Updated 5 months ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆54Jun 2, 2025Updated 9 months ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Calltree generator for Binary Ninja☆45Nov 13, 2025Updated 3 months ago
- COM S 413/513 and CPR E 513 Program Analysis @ Iowa State University☆30Nov 3, 2023Updated 2 years ago
- A tracer based on frida for XPC messages in iOS and macOS.☆35May 28, 2023Updated 2 years ago
- Juliet C/C++ Dynamic Test Suite☆35Apr 18, 2023Updated 2 years ago
- idenLib (Library Function Identification) plugin for x32dbg☆41Feb 26, 2019Updated 7 years ago
- Android Vulnerability Reports and POCs.☆27Feb 9, 2017Updated 9 years ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- iTLB multihit PoC☆42Nov 4, 2023Updated 2 years ago
- Toolkit for Dynamic Python code manipulations☆11Oct 19, 2024Updated last year
- ☆34Updated this week
- ☆34Sep 22, 2017Updated 8 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- Repository containing lectures from 2023 Machine Learning course☆11Mar 14, 2023Updated 2 years ago
- A generic data structures and algorithms library using C☆12Nov 13, 2022Updated 3 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- C++17 Wrapper for ScaLAPACK☆11Oct 5, 2023Updated 2 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- C to LLVM / Python compiler☆10Jan 17, 2017Updated 9 years ago
- ☆13Sep 5, 2024Updated last year
- Code and artifacts of the "Dissecting American Fuzzy Lop - A FuzzBench Evaluation" paper☆13Oct 3, 2022Updated 3 years ago
- CS 380D Distributed Systems at UT Austin with Vijay Chidambaram☆12Oct 19, 2023Updated 2 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Computer Systems Lab☆11Oct 16, 2025Updated 4 months ago
- An opinionated tool to create amazing presentations☆38Jan 28, 2023Updated 3 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- LogicMOO Natural Language Understanding Kit Unified into Prolog☆13Oct 2, 2021Updated 4 years ago