Reverse Engineering and Malware Analysis Roadmap
☆654Oct 2, 2025Updated 7 months ago
Alternatives and similar repositories for RE-MA-Roadmap
Users that are interested in RE-MA-Roadmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jan 31, 2026Updated 3 months ago
- RozDll by ROZBUD is a Powerful Reverse Engineering Tool that creates Hijacked DLLs and Standard Patchers. RozDll Is used In Software Veri…☆76Sep 14, 2025Updated 7 months ago
- A simple emulator for Windows designed for reverse engineering, testing binary files, and execution logging.☆54Jul 6, 2025Updated 10 months ago
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆685Mar 24, 2026Updated last month
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,436Apr 28, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 11 months ago
- ☆23Jun 28, 2025Updated 10 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆697Feb 1, 2026Updated 3 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Oct 7, 2024Updated last year
- Pure Malware Development Resource Collections☆436Dec 29, 2024Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 10 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆119Feb 18, 2025Updated last year
- WinDbg plugin to trace module transitions from a debugged driver.☆52Dec 22, 2025Updated 4 months ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Kernel Level NMI Callback Blocker☆172Apr 23, 2026Updated last week
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆122Oct 19, 2025Updated 6 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆94Sep 14, 2024Updated last year
- Collect Windows telemetry for Maldev☆475Updated this week
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆84Jul 27, 2024Updated last year
- Windows Local Privilege Escalation Cookbook☆1,311Feb 5, 2026Updated 3 months ago
- Load dll with undocumented functions and debug symbols☆47Jul 20, 2024Updated last year
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 4 months ago
- A Pin Tool for tracing API calls etc☆1,651Feb 8, 2026Updated 2 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆25Apr 8, 2025Updated last year
- ☆397Jun 13, 2025Updated 10 months ago
- Complete list of LPE exploits for Windows (starting from 2023)☆933Apr 24, 2026Updated last week
- The sequel to Voyager☆102Aug 21, 2024Updated last year
- Ghetto user mode emulation of Windows kernel drivers.☆162Oct 20, 2024Updated last year
- 热门网络游戏辅助开发教程☆15Jan 7, 2021Updated 5 years ago
- ☆699Apr 26, 2026Updated last week
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆212Aug 9, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Injecting DLL into LSASS at boot☆156Apr 29, 2025Updated last year
- Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods…☆1,559Feb 9, 2026Updated 2 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Shellcode Loader Library.☆15Sep 21, 2025Updated 7 months ago
- Windows kernel driver demonstrating kernel-to-usermode communication via shared memory sections☆103Apr 24, 2026Updated last week
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆1,819Apr 16, 2026Updated 2 weeks ago