Lists (25)
Sort Name ascending (A-Z)
Audit
4 repositories
Awesome
53 repositories
Bug Bounty
7 repositories
Burpsuite
11 repositories
Crypto
23 repositories
Defensive repo
46 repositories
DevOps
1 repository
Forensic
16 repositories
GPT
37 repositories
Interview preparation
2 repositories
KYC
3 repositories
Learning code
20 repositories
MALVARE DEV
30 repositories
Malware Analysis
6 repositories
Menu terminal
9 repositories
Mobile repo
All resources matter to subject33 repositories
Network
1 repository
Open source EDR
3 repositories
OWOF
1 repository
PenTest
241 repositories
Purple Team
10 repositories
Refactor code
9 repositories
SOC/DFIR
51 repositories
Web dev
12 repositories
Zero trust
17 repositories
Stars
- All languages
- Assembly
- AutoIt
- Awk
- C
- C#
- C++
- CSS
- CoffeeScript
- Dart
- Dockerfile
- Eagle
- Elixir
- Erlang
- FreeMarker
- Go
- Go Template
- HCL
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- MDX
- Makefile
- Mojo
- Nim
- Objective-C
- OpenEdge ABL
- PHP
- Pascal
- Perl
- PostScript
- PowerShell
- Pug
- Python
- Ruby
- Rust
- SCSS
- Scala
- Shell
- Solidity
- Swift
- TeX
- TypeScript
- Vala
- Vim Script
- Visual Basic .NET
- XSLT
- YAML
- YARA
8
stars
written in Assembly
Clear filter
Collection of malware source code for a variety of platforms in an array of different programming languages.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Code snippets for bare-metal malware development
A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.
trustedsec / SysWhispers
Forked from jthuraisamy/SysWhispersAV/EDR evasion via direct system calls.
cryptolok / REpsych
Forked from xoreaxeaxeax/REpsychPsychological warfare in reverse engineering