x86byte / RE-MA-RoadmapLinks
Reverse Engineering and Malware Analysis Roadmap
☆540Updated 3 months ago
Alternatives and similar repositories for RE-MA-Roadmap
Users that are interested in RE-MA-Roadmap are comparing it to the libraries listed below
Sorting:
- Pure Malware Development Resource Collections☆412Updated last year
- ⚠️ malware development☆666Updated last year
- ☆55Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆664Updated 3 weeks ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆718Updated last month
- Malware Development for Ethical Hackers, published by Packt☆430Updated 3 weeks ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆168Updated 4 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆283Updated last week
- ☆263Updated 2 years ago
- 🧞♂️ malware analysis☆36Updated last year
- Study materials for ethical hacking and cyber security☆73Updated 6 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆208Updated 5 months ago
- Important notes and topics on my journey towards mastering Windows Internals☆418Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆745Updated 11 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆65Updated last month
- Reverse Engineering challenges☆36Updated 5 years ago
- Collection of codes focused on Linux rootkits☆190Updated 2 months ago
- Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine…☆304Updated 2 months ago
- A comprehensive Hypervisor resources repo☆187Updated 2 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆424Updated 7 months ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆789Updated last year
- Useful scripts from past CTF challenges☆42Updated 3 months ago
- Three levels of beginner-friendly CTF challenges focused on reverse engineering to help people learn and practice.☆28Updated last year
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆791Updated this week
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆421Updated last month
- CTF source code(s) from multiple websites.☆10Updated 8 months ago
- A tutorial on how to write a packer for Windows!☆302Updated 2 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆53Updated 2 years ago
- Backup copy of [SnD] [lena151] Reversing With Lena (Tutorials)☆134Updated 4 years ago
- companion to our book of the same name, ISBN: 9781394199884☆158Updated last year