Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for reverse engineering cybersecurity
cybersecurity
x
reverse-engineering
x
37 search results found
Imhex
⭐
31,549
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Reverse Engineering
⭐
9,941
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Hacking Windows
⭐
1,014
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
Ctfs
⭐
379
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
Awesome List
⭐
365
Cybersecurity oriented awesome list
Degate
⭐
212
A modern and open-source cross-platform software for chips reverse engineering.
Picoctf2021 Writeup
⭐
148
Solutions (that we managed to find) for the 2021 PicoCTF
The_hive
⭐
137
My public notes about offensive security
Writeups
⭐
133
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Hacking Rust
⭐
133
A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch.
Witch_craft
⭐
125
WITCH_CRAFT is a versatile task automation software designed to serve as the foundation for various cyber security modules. It provides capabilities for tasks such as forensic research, OSINT (Open Source Intelligence), scanning, backup and copying, intrusion testing of applications and APIs, and more.
Empirectf
⭐
123
EmpireCTF – write-ups, capture the flag, cybersecurity
Mastering Reverse Engineering
⭐
110
Mastering Reverse Engineering, published by Packt
Go Hacking
⭐
99
A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Golang from scratch.
Superlibrary
⭐
94
Information Security Library
Onenoteanalyzer
⭐
69
A C# based tool for analysing malicious OneNote documents
Awesome Cyber
⭐
65
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Archive
⭐
65
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Ctf Write Ups
⭐
51
Write-ups for CTF challenges.
Cybersecurity_conferences
⭐
48
List of some cybersecurity conferences
Cybersec Books
⭐
47
Cyber Security Books
Cybergym
⭐
37
Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can access the challenges that can be easily setup and start playing.
Cyberqueens
⭐
29
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Shady Hook
⭐
27
Proof of Concept - Hooking API calls of a Ransomware
Ctf Writeups
⭐
22
CTF Writeups
Dc540 0x00005b
⭐
16
DC540 hacking challenge 0x00005b.
Jsec
⭐
15
Documentary of Java security techniques employed by some software.
Pyc2bytecode
⭐
14
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Practical_malware_analysis
⭐
14
Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
Tryhackme
⭐
13
The source files of my completed TryHackMe challenges and walkthroughs with links to their respective rooms
Hackgurat
⭐
11
Siber Güvenlik alanında kendini geliştirmek isteyenler için her türlü kaynağı bulunduran repo.
Flame Sourcecode
⭐
9
Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.
Malware Research Valuable Resources
⭐
9
Found resources in my malware researching adventure.
Darkgate Install Script Via Dns Txt Record
⭐
7
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
Intel
⭐
7
public malware intelligence
Toyos
⭐
6
ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.
Microsoft Malware Classification
⭐
5
🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Windows PE structures, disassembly scripts and machine code.
Degatedemoprojects
⭐
5
Degate demonstration projects.
Related Searches
Python Reverse Engineering (631)
Python Cybersecurity (583)
C Plus Plus Reverse Engineering (451)
Security Cybersecurity (402)
1-37 of 37 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.