Skip to content
View tr88th's full-sized avatar

Block or report tr88th

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
13 stars written in Assembly
Clear filter

Collection of malware source code for a variety of platforms in an array of different programming languages.

Assembly 17,601 1,994 Updated Sep 10, 2025

A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.

Assembly 13,060 1,190 Updated Jan 1, 2026

Materials for Windows Malware Analysis training (volume 1)

Assembly 2,016 205 Updated Jul 1, 2024

AV/EDR evasion via direct system calls.

Assembly 1,967 273 Updated Jan 1, 2023

AV/EDR evasion via direct system calls.

Assembly 1,771 253 Updated Sep 3, 2022

Template-Driven AV/EDR Evasion Framework

Assembly 1,758 278 Updated Nov 3, 2023

🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.

Assembly 1,142 196 Updated Jan 12, 2024

Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI

Assembly 724 153 Updated Jun 28, 2025

A small, null-free Windows shellcode that executes calc.exe (x86/x64, all OS/SPs)

Assembly 438 88 Updated May 21, 2024

Dynamic shellcode loader with sophisticated evasion capabilities

Assembly 274 50 Updated Oct 1, 2025

A technique of hiding malicious shellcode via Shannon encoding.

Assembly 261 33 Updated Oct 23, 2022

EvilVM compiler for information security research tools.

Assembly 203 21 Updated May 14, 2022

This repository covers cybersecurity, including network infiltration techniques, prevention measures, and advanced obfuscation methods. It emphasizes physical and digital security and provides MASM…

Assembly 5 1 Updated Apr 3, 2023