![ghidra logo](https://raw.githubusercontent.com/github/explore/025dc54b4cae71dcd3ff17e7a146d3365d87f665/topics/ghidra/ghidra.png)
- canada
- @bsoddreams
Block or Report
Block or report bsoddreams
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseLanguage: Assembly
Sort by: Most stars
Starred repositories
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Materials for Windows Malware Analysis training (volume 1)
AV/EDR evasion via direct system calls.
AV/EDR evasion via direct system calls.
MOVED TO: https://cirosantilli.com/linux-kernel-module-cheat/userland-assembly with code at https://github.com/cirosantilli/linux-kernel-module-cheat/tree/master/userland/arch/x86_64 SEE README. x8…
xoreaxeaxeax / sinkhole
Forked from Battelle/sinkholeArchitectural privilege escalation on x86
Source code for 'Low-Level Programming' by Igor Zhirkov
Just another Windows Process Injection
windows syscall table from xp ~ 10 rs4
X86 version of syswhispers2 / x86 direct system call
Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.
Assembly block for hooking windows API functions.
Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
APISearch Plugin (x86) - A Plugin For x64dbg
APIInfo Plugin (x86) - A Plugin For x64dbg
A radare2 Python script to dump a raw IA32 binary to an NASM source file