snappyJack / reverse-coreLinks
《逆向工程核心原理》源码及程序示例
☆133Updated 5 years ago
Alternatives and similar repositories for reverse-core
Users that are interested in reverse-core are comparing it to the libraries listed below
Sorting:
- 记录一下自己的病毒分析成果☆251Updated 4 years ago
- 二进制入门书籍☆256Updated 5 years ago
- 对160个Crackme的详细分析记录☆462Updated 6 years ago
- 恶意代码分析实战系列文章☆147Updated 2 years ago
- Syclover 二进制方向招新培训☆269Updated 3 years ago
- 逆向学习笔记总结☆67Updated 4 years ago
- 滴水三期课后习题答案☆105Updated 3 months ago
- 恶意代码分析实战程序-PracticalMalwareAnalysis-Labs-master☆43Updated 6 years ago
- c 编程语言☆239Updated 2 years ago
- CTF竞赛权威指南(Pwn篇) 相关资源☆172Updated 2 years ago
- 二进制安全高级参考资料☆121Updated 5 years ago
- Resource assembly of 'Binary Security Tutorial' online course of mine. Video link:https://pan.baidu.com/s/1ltcHIehhLFVFMvru6tGQ8A Passwd:…☆240Updated 6 years ago
- 该资源主要参考甘迪文老师的《Windows黑客编程技术详解》书籍,作者从实践角度编写代码,希望对您有所帮助~☆113Updated 4 years ago
- ☆58Updated 5 years ago
- ☆55Updated 5 years ago
- 汇总了目前可以找到的所有的进程注入的方式,完成了x86/x64下的测试,不断更新中☆279Updated 3 years ago
- IDA Pro每周小技巧☆277Updated 2 years ago
- Binary Hacking Study Notes☆248Updated last year
- 网安图书馆:文档。☆168Updated 6 years ago
- 《逆向工程核心原理》代码及案例☆98Updated 8 years ago
- 有需求做攻防对抗,买本书学习下常见技术,例子敲一敲☆224Updated 4 years ago
- Windows对抗沙箱和虚拟机的方法总结☆399Updated 5 years ago
- 《深入理解恶意代码与病毒样本》☆206Updated 2 years ago
- 该资源主要复现了WannCry勒索病毒过程,包括对应的资源、文章和勒索病毒。希望对您有所帮助~☆101Updated 3 years ago
- 2020年CTF赛题仓库-第一部分☆157Updated 4 years ago
- 海特实验室物联网安全知识库☆154Updated 4 years ago
- Anhkgg's Tools☆188Updated 4 years ago
- 0day安全_软件漏洞分析技术☆631Updated 7 years ago
- 网安类绝版图书(二)☆77Updated 2 years ago
- IoT安全教程☆294Updated 5 years ago