Skip to content
View bsoddreams's full-sized avatar
💭
I dream of kernel panics.
💭
I dream of kernel panics.
Block or Report

Block or report bsoddreams

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

24 stars written in Assembly
Clear filter

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.

Assembly 10,823 984 Updated Aug 5, 2024

File formats dissections and more...

Assembly 10,417 739 Updated Feb 18, 2024

Materials for Windows Malware Analysis training (volume 1)

Assembly 1,904 184 Updated Jul 1, 2024

AV/EDR evasion via direct system calls.

Assembly 1,760 264 Updated Jan 1, 2023

AV/EDR evasion via direct system calls.

Assembly 1,499 234 Updated Sep 3, 2022

Proof of Concepts (PE, PDF...)

Assembly 1,427 197 Updated Jan 8, 2023

MOVED TO: https://cirosantilli.com/linux-kernel-module-cheat/userland-assembly with code at https://github.com/cirosantilli/linux-kernel-module-cheat/tree/master/userland/arch/x86_64 SEE README. x8…

Assembly 851 119 Updated Jun 25, 2019

Architectural privilege escalation on x86

Assembly 848 76 Updated Mar 22, 2018

Source code for 'Low-Level Programming' by Igor Zhirkov

Assembly 752 197 Updated Nov 27, 2023
Assembly 465 86 Updated Oct 5, 2017

Just another Windows Process Injection

Assembly 387 82 Updated Aug 7, 2020

windows syscall table from xp ~ 10 rs4

Assembly 349 110 Updated Jun 8, 2018

KeyGen for 010 Editor

Assembly 341 110 Updated Mar 18, 2022

X86 version of syswhispers2 / x86 direct system call

Assembly 315 97 Updated Jan 28, 2021

Simple 32/64-bit PEs loader.

Assembly 137 38 Updated Dec 19, 2018

Semantics of x86-64 in K

Assembly 132 11 Updated Mar 4, 2020

Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.

Assembly 125 34 Updated Mar 11, 2023

Assembly block for hooking windows API functions.

Assembly 80 11 Updated Jul 16, 2019

ASM Malicious code - PE infector

Assembly 71 16 Updated Mar 23, 2017

Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.

Assembly 68 15 Updated May 3, 2023

C/C++ machine code obfuscation.

Assembly 64 8 Updated Aug 2, 2021

APISearch Plugin (x86) - A Plugin For x64dbg

Assembly 50 10 Updated Jul 17, 2018

APIInfo Plugin (x86) - A Plugin For x64dbg

Assembly 48 11 Updated Jul 17, 2018

A radare2 Python script to dump a raw IA32 binary to an NASM source file

Assembly 28 8 Updated May 14, 2021