x86byte / RE-MA-RoadmapLinks
Reverse Engineering and Malware Analysis Roadmap
☆559Updated 3 months ago
Alternatives and similar repositories for RE-MA-Roadmap
Users that are interested in RE-MA-Roadmap are comparing it to the libraries listed below
Sorting:
- Pure Malware Development Resource Collections☆417Updated last year
- ⚠️ malware development☆676Updated last year
- Malware Development for Ethical Hackers, published by Packt☆436Updated last month
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆726Updated 2 months ago
- Centralized resource for listing and organizing known injection techniques and POCs☆669Updated last month
- ☆56Updated last year
- 🧞♂️ malware analysis☆38Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆176Updated 5 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆288Updated 3 weeks ago
- ☆264Updated 2 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆211Updated 6 months ago
- Study materials for ethical hacking and cyber security☆79Updated 6 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆750Updated last year
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆430Updated last month
- Important notes and topics on my journey towards mastering Windows Internals☆422Updated last year
- companion to our book of the same name, ISBN: 9781394199884☆163Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆67Updated 2 months ago
- Collection of codes focused on Linux rootkits☆195Updated 3 months ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆794Updated last year
- Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine…☆316Updated 3 months ago
- Reverse Engineering challenges☆36Updated 5 years ago
- Fork repository for CryptoCat's "Binary Exploitation 101 Course" AKA "Practical Buffer Overflow Exploitation"☆22Updated 3 years ago
- Useful scripts from past CTF challenges☆43Updated 4 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆432Updated 8 months ago
- A tutorial on how to write a packer for Windows!☆304Updated 2 years ago
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆551Updated last week
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆435Updated last month
- ☆389Updated 7 months ago
- CTF source code(s) from multiple websites.☆10Updated 8 months ago
- how to get a few pwn points if you don't know how to pwn☆29Updated 6 years ago