yurembo / HackersBasicsLinks
В этом репозитории находятся все примеры, рассмотренные в книге «Фундаментальные основы хакерства. Анализ программ в среде Win64»
☆27Updated 2 years ago
Alternatives and similar repositories for HackersBasics
Users that are interested in HackersBasics are comparing it to the libraries listed below
Sorting:
- Введение в реверсинг с нуля, используя IDA PRO. Перевод от Яши☆116Updated 4 years ago
- Little library for assembly language (fasm, x86-64, linux).☆43Updated 2 years ago
- Kris Kaspersky books and articles, dokuwiki syntax☆40Updated 8 years ago
- Подробное руководство по созданию собственной Linux-системы из исходного кода☆178Updated 2 years ago
- Linux shared object injector written in pure C☆49Updated 5 months ago
- simple processor circuit suitable for repeating in transistors☆42Updated last year
- Schemes of Elbrus processors architecture☆11Updated 4 years ago
- БМПОС - Базовая Модульная Платформа Операционных Систем для платформы x86_64☆79Updated last year
- Уроки по графической библиотеке SFML☆20Updated 4 years ago
- awesome-e2k☆135Updated last year
- Strace: history, usage examples, example syscall tracer implementation☆10Updated 5 years ago
- 2048 written in x64 assembly for educational purposes (OS: Windows)☆18Updated 4 years ago
- Home librarian☆85Updated last week
- Примеры элементов фронтенда и бекенда компилятора на C++, Lemon и LLVM☆10Updated 8 years ago
- Patch Chrome to fix BlueTooth audio delay☆25Updated last year
- Private Mode eXecution for Windows on Python☆24Updated 4 years ago
- .deb package for far2l☆45Updated last year
- ☆46Updated 3 years ago
- ☆13Updated 4 years ago
- shtirllitz plugin for notepad++☆15Updated 6 years ago
- Minimal Telegram client for various platforms powered by proxy-server☆28Updated last year
- ☆15Updated 6 years ago
- ☆60Updated last week
- books☆204Updated 8 years ago
- Performance patches and build fixes for Elbrus 2000 (e2k) architecture.☆47Updated 2 months ago
- 🛡️ Anonymous F2F network based on the QB-problem & GP/12 protocol stack. Uses post-quantum cryptographic algorithms: ML-KEM, ML-DSA☆160Updated this week
- CryptoPro PFX Decoder☆39Updated 5 months ago
- Цикл туториалов Рикардо Нарвахи «Введение в крэкинг с помощью OllyDbg»☆36Updated 3 years ago
- HOOGMOON — Remote Access OS for Internet Censorship Research☆35Updated 10 months ago
- YouTube: https://www.youtube.com/watch?v=CRFNbq2pBxM&list=PLZE6vX9-9H1OKO8nCycPch7m8oAHtDFTY☆28Updated 7 years ago