Skip to content
View florianamette's full-sized avatar
🎯
Focusing
🎯
Focusing

Highlights

  • Pro

Organizations

@Cyber-Experts @Cyber-Courses @Blockchains-Experts @CyberCTF

Block or report florianamette

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

14 stars written in Assembly
Clear filter

The original sources of MS-DOS 1.25, 2.0, and 4.0 for reference purposes

Assembly 31,774 4,552 Updated Apr 25, 2024

Collection of malware source code for a variety of platforms in an array of different programming languages.

Assembly 17,928 2,012 Updated Sep 10, 2025

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.

Assembly 13,420 1,246 Updated Apr 1, 2026

An experiment.

Assembly 4,069 787 Updated Mar 25, 2026

AV/EDR evasion via direct system calls.

Assembly 2,001 275 Updated Jan 1, 2023

AV/EDR evasion via direct system calls.

Assembly 1,804 261 Updated Sep 3, 2022

Template-Driven AV/EDR Evasion Framework

Assembly 1,785 279 Updated Nov 3, 2023

Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI

Assembly 736 148 Updated Jun 28, 2025

I'm going to be dropping code from the XC3 Driver (result of reversing the driver)

Assembly 72 25 Updated Jan 31, 2020

Process Injection: APC Injection

Assembly 33 14 Updated Jan 13, 2021
Assembly 29 3 Updated Aug 24, 2025

A Metamorphic virus 🌺

Assembly 19 1 Updated Feb 1, 2022

Examples of self-modifying x86 linux assembly

Assembly 11 1 Updated Dec 20, 2021

eBPF BCC-based code that does the observation inside the kernel for the mprotect() system call, and 2 other c code files that work to bypass the NX one of them just bypass the NX and execute a mov …

Assembly 1 Updated Apr 8, 2024