x86byte / RE-MA-Roadmap
Reverse Engineering and Malware Analysis Roadmap
☆141Updated this week
Alternatives and similar repositories for RE-MA-Roadmap
Users that are interested in RE-MA-Roadmap are comparing it to the libraries listed below
Sorting:
- Pure Malware Development Resource Collections☆281Updated 4 months ago
- ⚠️ malware development☆541Updated 11 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆222Updated last week
- Centralized resource for listing and organizing known injection techniques and POCs☆481Updated 3 weeks ago
- ☆227Updated last year
- ☆40Updated 7 months ago
- Malware Development for Ethical Hackers, published by Packt☆318Updated 5 months ago
- ☆22Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆48Updated 3 weeks ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆177Updated 2 months ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆558Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆43Updated last month
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆373Updated 5 months ago
- Collection of codes focused on Linux rootkits☆107Updated 2 months ago
- Important notes and topics on my journey towards mastering Windows Internals☆376Updated last year
- ☆114Updated 2 weeks ago
- My collection of malware dev links☆266Updated 8 months ago
- Embed a payload inside a PNG file☆315Updated 6 months ago
- PE bin2bin obfuscator☆686Updated last month
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 8 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆220Updated 6 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆189Updated last month
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆332Updated last week
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 4 months ago
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆118Updated last week
- ☆352Updated last year
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆201Updated 2 months ago
- Windows Kernel Rootkit in Rust☆594Updated 3 weeks ago
- A tutorial on how to write a packer for Windows!☆272Updated last year
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆84Updated 5 months ago