TrashDBG the world's worse debugger
☆23Feb 17, 2022Updated 4 years ago
Alternatives and similar repositories for trashdbg
Users that are interested in trashdbg are comparing it to the libraries listed below
Sorting:
- Code snips and notes☆140Mar 10, 2022Updated 3 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- a small curation of created/stolen scripts for reverse engineering☆12May 3, 2024Updated last year
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- Uncover IPv6 address harvesting through firewall log analysis☆13Jan 29, 2016Updated 10 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- ☆14Aug 8, 2022Updated 3 years ago
- The best theme for x64dbg!☆91Aug 5, 2022Updated 3 years ago
- How to retro theme your Ghidra☆36Feb 24, 2026Updated last week
- Collection of slides for security presentations I've given in various forums☆14Dec 10, 2023Updated 2 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Jun 9, 2022Updated 3 years ago
- HashDB API hash lookup plugin for IDA Pro☆350Oct 9, 2025Updated 4 months ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆20Nov 1, 2024Updated last year
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- ☆16May 15, 2021Updated 4 years ago
- Small programs and scripts that do not require their own repositories☆139Feb 24, 2022Updated 4 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- ☆21Mar 18, 2019Updated 6 years ago
- Research notes☆132Dec 6, 2024Updated last year
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆855Feb 2, 2024Updated 2 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆26Mar 22, 2018Updated 7 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Feb 15, 2022Updated 4 years ago
- A guide on how to write fast and memory friendly YARA rules☆166Feb 11, 2025Updated last year
- Clone of the IDAPython repo☆23Mar 16, 2015Updated 10 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- ☆24Oct 30, 2024Updated last year
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Jun 11, 2025Updated 8 months ago
- ☆29May 10, 2020Updated 5 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago