This repository has an educational purpose, for those who are interested in learning Reverse Engineering in a practical way, with simple programs.
Consequently, if these binaries are executed in a monitored environment, it is possible to identify some insights for the process of creating intelligence for threat detection (: . I highly recommend this learning method, as studying patterns of suspicious behavior makes you a little more cautious.
It is also possible for those who want to learn a little about the development of malicious software in the C programming language for Windows systems. And please don't make fun of my C skills, I'm not a developer, just curious.
