x86byte / RE-MA-Roadmap
Reverse Engineering and Malware Analysis Roadmap
☆74Updated 6 months ago
Alternatives and similar repositories for RE-MA-Roadmap:
Users that are interested in RE-MA-Roadmap are comparing it to the libraries listed below
- Pure Malware Development Resource Collections☆221Updated last month
- ☆30Updated 4 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆238Updated 3 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆204Updated 2 weeks ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆116Updated last month
- Collection of codes focused on Linux rootkits☆84Updated 3 weeks ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆119Updated last month
- 🧞♂️ malware analysis☆34Updated 11 months ago
- A comprehensive Hypervisor resources repo☆101Updated last week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆327Updated 4 months ago
- Embed a payload inside a PNG file☆291Updated 3 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆137Updated 5 months ago
- ☆214Updated last month
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆50Updated 5 months ago
- My collection of malware dev links☆255Updated 5 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆250Updated 4 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆32Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆65Updated 3 months ago
- Windows Kernel Rootkit in Rust☆396Updated this week
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆30Updated 3 months ago
- ☆39Updated last year
- ☆338Updated last year
- ☆64Updated 3 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆357Updated 2 months ago
- A reverse shell for Windows and Linux written in C.☆66Updated 2 years ago
- ☆212Updated this week
- Collection of resources to learn pentesting, exploit development, obfuscation & much more.☆96Updated 2 years ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆203Updated 3 months ago