snappyJack / reverse-coreLinks
《逆向工程核心原理》源码及程序示例
☆135Updated 5 years ago
Alternatives and similar repositories for reverse-core
Users that are interested in reverse-core are comparing it to the libraries listed below
Sorting:
- Syclover 二进制方向招新培训☆275Updated 4 years ago
- 二进制入门书籍☆256Updated 5 years ago
- 记录一下自己的病毒分析成果☆252Updated 4 years ago
- 恶意代码分析实战系列文章☆159Updated 2 years ago
- 滴水三期课后习题答案☆107Updated 6 months ago
- 二进制安全高级参考资料☆121Updated 5 years ago
- 对160个Crackme的详细分析记录☆478Updated 6 years ago
- CTF竞赛权威指南(Pwn篇) 相关资源☆174Updated 2 years ago
- c 编程语言☆239Updated 3 years ago
- 逆向学习笔记总结☆68Updated 4 years ago
- ☆59Updated 6 years ago
- ☆56Updated 5 years ago
- Resource assembly of 'Binary Security Tutorial' online course of mine. Video link:https://pan.baidu.com/s/1ltcHIehhLFVFMvru6tGQ8A Passwd:…☆242Updated 6 years ago
- 该资源主要参考甘迪文老师的《Windows黑客编程技术详解》书籍,作者从实践角度编写代码,希望对您有所帮助~☆116Updated 5 years ago
- 恶意代码分析实战程序-PracticalMalwareAnalysis-Labs-master☆46Updated 6 years ago
- IDA Pro每周小技巧☆278Updated 2 years ago
- 《深入理解恶意代码与病毒样本》☆215Updated 2 years ago
- Binary Hacking Study Notes☆250Updated last year
- 海特实验室物联网安全知识库☆158Updated 4 years ago
- 网安图书馆:文档。☆170Updated 6 years ago
- 该资源主要复现了WannCry勒索病毒过程,包括对应的资源、文章和勒索病毒。希望对您有所帮助~☆105Updated 4 years ago
- 《二进制安全测试与安全研究》☆109Updated last year
- 汇总了目前 可以找到的所有的进程注入的方式,完成了x86/x64下的测试,不断更新中☆283Updated 3 years ago
- 网安类绝版图书(二)☆78Updated 2 years ago
- IDA插件集合,含项目名称及项目地址,每日定时Clone项目。☆438Updated 2 months ago
- 《逆向工程核心原理》代码及案例☆99Updated 8 years ago
- 2020年CTF赛题仓库-第一部分☆155Updated 5 years ago
- CTF PWN 做题环境一键搭建脚本☆159Updated last year
- IoT安全教程☆294Updated 5 years ago
- 有需求做攻防对抗,买本书学习下常见技术,例子敲一敲☆228Updated 4 years ago