Highlights
- Pro
Lists (3)
Sort Name ascending (A-Z)
- All languages
- Assembly
- Astro
- AutoIt
- Awk
- Batchfile
- Bicep
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Clojure
- Cuda
- Dart
- Dockerfile
- Elixir
- Elm
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Inno Setup
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Just
- Kotlin
- LLVM
- Lua
- MDX
- MLIR
- Makefile
- Markdown
- Modula-3
- Nim
- Nunjucks
- OCaml
- Objective-C
- Objective-C++
- Open Policy Agent
- PHP
- Pascal
- Perl
- PowerShell
- Puppet
- Python
- Racket
- Roff
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Smarty
- Solidity
- Svelte
- Swift
- SystemVerilog
- TeX
- TypeScript
- VBA
- VBScript
- Vim Script
- Visual Basic
- Vue
- Wikitext
- XSLT
- YARA
- Zig
Starred repositories
The original sources of MS-DOS 1.25, 2.0, and 4.0 for reference purposes
Collection of malware source code for a variety of platforms in an array of different programming languages.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
AV/EDR evasion via direct system calls.
AV/EDR evasion via direct system calls.
Template-Driven AV/EDR Evasion Framework
Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI
I'm going to be dropping code from the XC3 Driver (result of reversing the driver)
Examples of self-modifying x86 linux assembly
eBPF BCC-based code that does the observation inside the kernel for the mprotect() system call, and 2 other c code files that work to bypass the NX one of them just bypass the NX and execute a mov …