Online regex tester, debugger with highlighting for PHP, PCRE, Python, Golang and JavaScript.
https://regex101.com/
https://regex101.com/
regex101
regex101: build, test, and debug regex
Regular expression tester with syntax highlighting, explanation, cheat sheet for PHP/PCRE, Python, GO, JavaScript, Java, C#/.NET, Rust.
[ExpDev] Weaponizing Your Favorite PE — Portable Executable Exploit
https://link.medium.com/fF6Sdvdls1
https://link.medium.com/fF6Sdvdls1
Malware on Steroids
Part 1: Simple CMD Reverse Shell
https://0xdarkvortex.dev/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/
Part 2: Evading Antivirus in a Simulated Organizational Environment
https://0xdarkvortex.dev/index.php/2018/09/17/malware-on-steroids-part-2-evading-antivirus-in-a-simulated-organizational-environment/
Part 3: Machine Learning & Sandbox Evasion
https://0xdarkvortex.dev/index.php/2018/10/27/malware-on-steroids-part-3-machine-learning-sandbox-evasion/
Part 4: Defender and Symantec Endpoint Protection Evasion
https://0xdarkvortex.dev/index.php/2018/11/01/malware-on-steroids-part-4-defender-and-symantec-endpoint-protection-evasion/
Part 1: Simple CMD Reverse Shell
https://0xdarkvortex.dev/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/
Part 2: Evading Antivirus in a Simulated Organizational Environment
https://0xdarkvortex.dev/index.php/2018/09/17/malware-on-steroids-part-2-evading-antivirus-in-a-simulated-organizational-environment/
Part 3: Machine Learning & Sandbox Evasion
https://0xdarkvortex.dev/index.php/2018/10/27/malware-on-steroids-part-3-machine-learning-sandbox-evasion/
Part 4: Defender and Symantec Endpoint Protection Evasion
https://0xdarkvortex.dev/index.php/2018/11/01/malware-on-steroids-part-4-defender-and-symantec-endpoint-protection-evasion/
Code that allows running another windows PE in the same address space as the host process.
https://github.com/Zer0Mem0ry/RunPE
https://github.com/Zer0Mem0ry/RunPE
GitHub
GitHub - Zer0Mem0ry/RunPE: Code that allows running another windows PE in the same address space as the host process.
Code that allows running another windows PE in the same address space as the host process. - Zer0Mem0ry/RunPE
Converts PE so that it can be then injected just like a normal shellcode.
(At the same time, the output file remains to be a valid PE).
Supports both 32 and 64 bit PEs
https://github.com/hasherezade/pe_to_shellcode
(At the same time, the output file remains to be a valid PE).
Supports both 32 and 64 bit PEs
https://github.com/hasherezade/pe_to_shellcode
GitHub
GitHub - hasherezade/pe_to_shellcode: Converts PE into a shellcode
Converts PE into a shellcode. Contribute to hasherezade/pe_to_shellcode development by creating an account on GitHub.
Portable Executable (P.E.) Code Injection: Injecting an Entire C Compiled Application
https://www.codeproject.com/Articles/24417/Portable-Executable-P-E-Code-Injection-Injecting-a
https://www.codeproject.com/Articles/24417/Portable-Executable-P-E-Code-Injection-Injecting-a
Using OOAnalyzer to Reverse Engineer Object Oriented Code with Ghidra
https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html
https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html
This media is not supported in your browser
VIEW IN TELEGRAM
ROPGenerator is a tool that helps you building ROP exploits by finding and chaining gadgets together
https://github.com/Boyan-MILANOV/ropgenerator
https://github.com/Boyan-MILANOV/ropgenerator
Debugging Windows Services For Malware Analysis / Reverse Engineering
https://secrary.com/Random/WindowsServiceDebugging/
https://secrary.com/Random/WindowsServiceDebugging/
SMUC: Simplified MITRE Use Cases, it describes the Attack and Detection
https://github.com/karemfaisal/SMUC
https://github.com/karemfaisal/SMUC
Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.
https://github.com/HassanShehata/KeySpark
https://github.com/HassanShehata/KeySpark
HiddenWasp Malware Stings Targeted Linux Systems
https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/
https://www.intezer.com/blog-hiddenwasp-malware-targeting-linux-systems/