An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
-
Updated
Jul 13, 2024 - C++
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
GNU Radio – the Free and Open Software Radio Ecosystem
Nidhogg is an all-in-one simple to use rootkit.
📝 ⌨️ A GNU/Linux keylogger that works!
Lilith, C++ Cybersecurity Research Project
Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
OPCDE Cybersecurity Conference Materials
Version 2 of the Graphical Realism Framework for Industrial Control Simulation (GRFICS)
Venom is a library that meant to perform evasive communication using stolen browser socket
A modern and open-source cross-platform software for chips reverse engineering.
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.
Advanced buffer overflow and memory corruption security challenges
Capturing, analysing and responding to cyber attacks
A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
A targeted DNS cache poisoner
Geographical host protection for Linux/FreeBSD
Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentionally introduced by the leaker to prevent the locker from being built. The Queue header file which implements a few linked list data structures that Conti uses for task scheduling in the Threadpool had several mi…
Created by The cybersecurity community