x86byte / RE-MA-Roadmap
Reverse Engineering and Malware Analysis Roadmap
☆101Updated 7 months ago
Alternatives and similar repositories for RE-MA-Roadmap:
Users that are interested in RE-MA-Roadmap are comparing it to the libraries listed below
- Pure Malware Development Resource Collections☆250Updated 3 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆212Updated 2 weeks ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆37Updated last week
- ⚠️ malware development☆519Updated 10 months ago
- ☆33Updated 5 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆244Updated 4 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆174Updated 2 weeks ago
- ☆219Updated last year
- 🧞♂️ malware analysis☆34Updated last year
- Введение в разработку вредоносных программ☆9Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆36Updated 3 weeks ago
- Malware Development for Ethical Hackers, published by Packt☆294Updated 4 months ago
- My collection of malware dev links☆260Updated 6 months ago
- Collection of codes focused on Linux rootkits☆95Updated last month
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆208Updated 5 months ago
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆146Updated 3 years ago
- Windows rootkit designed to work with BYOVD exploits☆173Updated 2 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆140Updated 6 months ago
- Embed a payload inside a PNG file☆302Updated 5 months ago
- Important notes and topics on my journey towards mastering Windows Internals☆371Updated 10 months ago
- Vulnerable driver research tool, result and exploit PoCs☆189Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆120Updated 2 months ago
- Windows Kernel Rootkit in Rust☆521Updated 3 weeks ago
- A comprehensive Hypervisor resources repo☆104Updated last month
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆33Updated last year
- A collection of malware families and malware samples which use the Rust programming language.☆157Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆178Updated 2 weeks ago
- A dynamic unpacking tool☆133Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆367Updated 3 months ago
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆180Updated last year