Skip to content
View EvilAres's full-sized avatar
🏯
🏯

Block or report EvilAres

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

Awesome

40 repositories

Rust Weaponization for Red Team Engagements.

Rust 2,712 303 Updated Apr 25, 2024

A curated list of awesome reversing resources

4,063 571 Updated Aug 19, 2023

Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)

4,493 859 Updated Sep 1, 2021

avList - 杀软进程对应杀软名称

JavaScript 396 77 Updated Oct 21, 2021

This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.

C 1,242 114 Updated Oct 7, 2022

# Full overview of current vulnerability, exploit , fuzz, mitigation of current major Operation System(Windows, macOS, Linux, Android,iOS and so forath) and popular applicaiton

52 9 Updated Jul 5, 2017

Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel CVE debug.

C 636 82 Updated Aug 26, 2024

威胁情报,恶意样本分析,开源Malware代码收集

334 130 Updated Nov 1, 2019

An evolving how-to guide for securing a Linux server.

17,529 1,124 Updated Oct 19, 2024

Karta - source code assisted fast binary matching plugin for IDA

Python 864 103 Updated May 13, 2023

Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provi…

HTML 384 57 Updated Jul 10, 2024

Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommen…

HTML 49 21 Updated Nov 8, 2023

🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)

C 2,929 668 Updated Feb 15, 2023

网络信息安全从业者面试指南

1,438 145 Updated Nov 1, 2023

视频课件和工具分享

Python 735 232 Updated Jul 5, 2023

A curated list of public TEE resources for learning how to reverse-engineer and achieve trusted code execution on ARM devices

886 101 Updated Jul 8, 2024

A curated list of awesome things related to Suricata

131 11 Updated Jun 25, 2024

🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.

Assembly 986 184 Updated Jan 12, 2024

Repository of creating different example suricata data sets

Shell 32 9 Updated Jan 2, 2019

Linux 内核揭秘

Python 7,160 1,181 Updated Aug 13, 2024

Style guides for Google-originated open-source projects

HTML 37,446 13,295 Updated Nov 6, 2024

A collection of resources for linux reverse engineering

1,994 363 Updated Jun 2, 2022

The Source Code of Firefox on Desktop

C++ 25 19 Updated Nov 9, 2024

2018年初整理的一些内网渗透TIPS,后面更新的慢,所以整理出来希望跟小伙伴们一起更新维护~

4,498 1,092 Updated Feb 24, 2023

Tracking interesting Linux (and UNIX) malware. Send PRs

HTML 1,127 90 Updated Oct 11, 2024

⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡

Python 18,191 1,161 Updated Mar 26, 2024

A list of my personal projects

167 9 Updated Aug 13, 2022

Nidhogg is an all-in-one simple to use windows kernel rootkit.

C++ 1,780 265 Updated Oct 3, 2024

An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.

Python 139 20 Updated Nov 8, 2024