Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.
☆41Jan 7, 2021Updated 5 years ago
Alternatives and similar repositories for Reverse-Engineering-Cheatsheet
Users that are interested in Reverse-Engineering-Cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- ☆22Feb 3, 2026Updated last month
- ☆26Jan 27, 2022Updated 4 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- Fully automated dev environment setup with dotfiles☆11Apr 7, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- PHP 8 Sandbox Escape☆71Feb 28, 2026Updated 3 weeks ago
- Linux Process Injection via Seccomp Notifier☆84Dec 9, 2025Updated 3 months ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Aug 26, 2023Updated 2 years ago
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- A substitute repository put up on public demand for the original Awesome WAF repository (https://github.com/0xInfection/Awesome-WAF) whic…☆12May 3, 2019Updated 6 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆231Mar 13, 2026Updated 2 weeks ago
- ☆12Aug 31, 2020Updated 5 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- AI-powered reverse-engineering of Rosetta (2 for Linux). Disclaimer: due to the user agreement, I will not touch the code. All is done by…☆57Mar 14, 2026Updated last week
- Rockyou for web fuzzing☆15Jan 28, 2022Updated 4 years ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Home Lab creation project with Active Directory☆20May 13, 2025Updated 10 months ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- ☆14Aug 26, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- Here is a collage of reverse engineering topics that I find interesting☆16Dec 10, 2017Updated 8 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Improve safety, security, and privacy of AI systems at build, deploy and run stages.☆35Jan 27, 2026Updated last month
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 11 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- fork of myevic firmware for tubo project☆11Apr 23, 2018Updated 7 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- HoneyPot Orchestration☆11Aug 3, 2023Updated 2 years ago
- Convert MIDI files to Serum and Vital LFOs.☆13Aug 31, 2023Updated 2 years ago
- A privacy-focused, client-side OSINT tool designed to automate advanced Google Dorking. Streamlines the passive reconnaissance phase for …☆35Feb 9, 2026Updated last month
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- 🤖 A list of malicious domains on Discord using the Discord Guardian Action.☆16Sep 29, 2024Updated last year
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago