snappyJack / reverse-coreLinks
《逆向工程核心原理》源码及程序示例
☆134Updated 5 years ago
Alternatives and similar repositories for reverse-core
Users that are interested in reverse-core are comparing it to the libraries listed below
Sorting:
- 二进制入门书籍☆256Updated 5 years ago
- 记录一下自己的病毒分析成果☆252Updated 4 years ago
- c 编程语言☆239Updated 3 years ago
- Syclover 二进制方向招新培训☆275Updated 4 years ago
- 逆向学习笔记总结☆68Updated 4 years ago
- 二进制安全高级参考资料☆121Updated 5 years ago
- 恶意代码分析实战系列文章☆157Updated 2 years ago
- 恶意代码分析实战程序-PracticalMalwareAnalysis-Labs-master☆46Updated 6 years ago
- 对160个Crackme的详细分析记录☆475Updated 6 years ago
- 滴水三期课后习题答案☆106Updated 5 months ago
- CTF竞赛权威指南(Pwn篇) 相关资源☆174Updated 2 years ago
- ☆55Updated 5 years ago
- IDA Pro每周小技巧☆278Updated 2 years ago
- Resource assembly of 'Binary Security Tutorial' online course of mine. Video link:https://pan.baidu.com/s/1ltcHIehhLFVFMvru6tGQ8A Passwd:…☆242Updated 6 years ago
- 该资源主要参考甘迪文老师的《Windows黑客编程技术详解》书籍,作者从实践角度编写代码,希望对您有所帮助~☆115Updated 4 years ago
- ☆59Updated 6 years ago
- 汇总了目前可以找到的所有的进程注入的方式,完成了x86/x64下的测试,不断更新中☆283Updated 3 years ago
- 《深入理解恶意代码与病毒样本》☆214Updated 2 years ago
- Windows对抗沙箱和虚拟机的方法总结☆401Updated 5 years ago
- 2020年CTF赛题仓库-第一部分☆155Updated 5 years ago
- 0day安全_软件漏洞分析技术☆635Updated 7 years ago
- 网安图书馆:文档。☆170Updated 6 years ago
- Binary Hacking Study Notes☆248Updated last year
- 《逆向工程核心原理》代码及案例☆99Updated 8 years ago
- IoT安全教程☆293Updated 5 years ago
- 该资源主要复现了WannCry勒索病毒过程,包括对应的资源、文章和勒索病毒。希望对您有所帮助~☆104Updated 4 years ago
- Anhkgg's Tools☆190Updated 4 years ago
- 有需求做攻防对抗,买本书学习下常见技术,例子敲一敲☆228Updated 4 years ago
- PWN初学者好题精炼☆28Updated 8 years ago
- IDA插件集合,含项目名称及项目地址,每日定时Clone项目。☆437Updated last month