| CERT-Polska/drakvuf-sandbox |
949 |
|
0 |
0 |
about 2 years ago |
0 |
|
91 |
other |
Python |
| DRAKVUF Sandbox - automated hypervisor-level malware analysis system |
| Captainarash/The_Holy_Book_of_X86 |
873 |
|
0 |
0 |
about 7 years ago |
0 |
|
0 |
cc-by-sa-4.0 |
|
| A simple guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS.... |
| aozhimin/iOS-Debug-Hacks |
614 |
|
0 |
0 |
over 8 years ago |
0 |
|
1 |
mit |
|
| :dart: Advanced debugging skills used in the iOS project development process, involves the dynamic debugging, static analysis and decompile of third-party libraries. iOS 项目开发过程中用到的高级调试技巧,涉及三方库动态调试、静态分析和反编译等领域 |
| ChrisTheCoolHut/PinCTF |
403 |
|
0 |
0 |
about 6 years ago |
0 |
|
5 |
|
Python |
| Using Intel's PIN tool to solve CTF problems |
| BeaEngine/beaengine |
330 |
|
0 |
0 |
over 5 years ago |
0 |
|
2 |
|
Python |
| BeaEngine disasm project |
| ttmo-O/x86-manpages |
157 |
|
0 |
0 |
about 6 years ago |
0 |
|
0 |
mit |
Roff |
| x86 and amd64 instruction reference manual pages |
| mytechnotalent/Go-Hacking |
99 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
apache-2.0 |
Go |
| A FREE comprehensive online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Golang from scratch. |
| williballenthin/lancelot |
82 |
|
0 |
2 |
over 2 years ago |
32 |
June 27, 2023 |
26 |
apache-2.0 |
Rust |
| intel x86(-64) code analysis library that reconstructs control flow |
| AYIDouble/x86-Assembly-Reverse-Engineering |
13 |
|
0 |
0 |
over 7 years ago |
0 |
|
2 |
mit |
Assembly |
| 🛠 Knowledge about the topic of x86 assembly & disassembly 🛠 |
| P3t3rp4rk3r/Malware-Analysis |
9 |
|
0 |
0 |
over 9 years ago |
0 |
|
0 |
|
|