ujjwal-kr / brainf
Making a brainf*ck compiler in 24 hours
☆13Updated last year
Related projects ⓘ
Alternatives and complementary repositories for brainf
- List of resources for aspiring contributors related to technologies we use here at hackarmour☆11Updated last year
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆28Updated 2 years ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Updated last year
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆16Updated last year
- Persistence techniques for windows.☆19Updated last year
- ☆33Updated last year
- ☆64Updated 3 years ago
- Protocol Reverse Engineering Resources☆20Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- DNS over HTTPS targeted malware (only runs once)☆94Updated last year
- Full exploit chain for Faronics-DeepFreeze-8☆3Updated last year
- Native Powers Talk demos☆14Updated last year
- Lena's scripts/code/resources for malware analysis☆25Updated 5 months ago
- ☆11Updated 10 months ago
- ☆12Updated 4 years ago
- A series of writes about “Binary Exploitation”.☆86Updated last year
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆23Updated 6 months ago
- CATANA - CUT your Wordlist!☆13Updated 2 years ago
- Understanding some of the Anti-Reversing Techniques☆12Updated 5 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 4 years ago
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆95Updated last year
- ☆81Updated 7 years ago
- OFFZONE 2024 Malware Persistence workshop☆15Updated 2 months ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆25Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆17Updated 2 years ago
- A collection of malware families and malware samples which use the Rust programming language.☆131Updated 10 months ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆28Updated last year
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Updated 2 years ago
- curiosity got me here☆34Updated 3 months ago