x86byte / RE-MA-RoadmapLinks
Reverse Engineering and Malware Analysis Roadmap
☆182Updated 3 weeks ago
Alternatives and similar repositories for RE-MA-Roadmap
Users that are interested in RE-MA-Roadmap are comparing it to the libraries listed below
Sorting:
- Pure Malware Development Resource Collections☆293Updated 5 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆515Updated last week
- ⚠️ malware development☆550Updated last year
- ☆22Updated last year
- ☆40Updated 8 months ago
- ☆229Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆179Updated 2 months ago
- Malware Development for Ethical Hackers, published by Packt☆323Updated 6 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆229Updated this week
- Important notes and topics on my journey towards mastering Windows Internals☆389Updated last year
- A tutorial on how to write a packer for Windows!☆275Updated last year
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆569Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 9 months ago
- My collection of malware dev links☆268Updated 9 months ago
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆19Updated 2 years ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆378Updated last week
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆212Updated 3 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆143Updated 2 years ago
- 🧞♂️ malware analysis☆35Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆45Updated 2 months ago
- This is a very detailed Binary exploitation roadmap starting from the very first vulnerability to the latest , each one with its mitigati…☆20Updated last year
- Embed a payload inside a PNG file☆321Updated 7 months ago
- Vulnerable driver research tool, result and exploit PoCs☆193Updated last year
- Collection of codes focused on Linux rootkits☆110Updated 3 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆56Updated last month
- ☆54Updated last week
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆707Updated 4 months ago
- A comprehensive Hypervisor resources repo☆108Updated last week
- Study materials for ethical hacking and cyber security☆60Updated 5 years ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆536Updated last month