Reverse Engineering and Malware Analysis Roadmap
☆609Oct 2, 2025Updated 5 months ago
Alternatives and similar repositories for RE-MA-Roadmap
Users that are interested in RE-MA-Roadmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Jan 31, 2026Updated last month
- RozDll by ROZBUD is a Powerful Reverse Engineering Tool that creates Hijacked DLLs and Standard Patchers. RozDll Is used In Software Veri…☆74Sep 14, 2025Updated 6 months ago
- A simple emulator for Windows designed for reverse engineering, testing binary files, and execution logging.☆54Jul 6, 2025Updated 8 months ago
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆661Feb 7, 2026Updated last month
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,342Mar 4, 2026Updated 3 weeks ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 10 months ago
- ☆23Jun 28, 2025Updated 8 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆689Feb 1, 2026Updated last month
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Oct 7, 2024Updated last year
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 9 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆113Feb 18, 2025Updated last year
- WinDbg plugin to trace module transitions from a debugged driver.☆47Dec 22, 2025Updated 3 months ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆79Jul 27, 2024Updated last year
- Kernel Level NMI Callback Blocker☆168Sep 27, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 4 months ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆120Oct 19, 2025Updated 5 months ago
- Collect Windows telemetry for Maldev☆465Jan 30, 2026Updated last month
- Pure Malware Development Resource Collections☆434Dec 29, 2024Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆88Sep 14, 2024Updated last year
- Windows Local Privilege Escalation Cookbook☆1,287Feb 5, 2026Updated last month
- Load dll with undocumented functions and debug symbols☆47Jul 20, 2024Updated last year
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 3 months ago
- ☆391Jun 13, 2025Updated 9 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Complete list of LPE exploits for Windows (starting from 2023)☆911Mar 13, 2026Updated last week
- ☆24Apr 8, 2025Updated 11 months ago
- The sequel to Voyager☆100Aug 21, 2024Updated last year
- Ghetto user mode emulation of Windows kernel drivers.☆163Oct 20, 2024Updated last year
- A Pin Tool for tracing API calls etc☆1,637Feb 8, 2026Updated last month
- 热门网络游戏辅助开发教程☆15Jan 7, 2021Updated 5 years ago
- ☆688Mar 20, 2026Updated last week
- Bypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods…☆1,470Feb 9, 2026Updated last month
- LLVM based obfuscation engine☆113Jun 19, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- driver that communicates using a shared section☆96Mar 17, 2025Updated last year
- Injecting DLL into LSASS at boot☆156Apr 29, 2025Updated 10 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆1,773Mar 13, 2026Updated last week
- Shellcode Loader Library.☆14Sep 21, 2025Updated 6 months ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago