TrashDBG the world's worse debugger
☆23Feb 17, 2022Updated 4 years ago
Alternatives and similar repositories for trashdbg
Users that are interested in trashdbg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code snips and notes☆141Mar 10, 2022Updated 4 years ago
- The best theme for x64dbg!☆86Aug 5, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- ☆14Aug 8, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- IDA plugin for quickly copying disassembly as encoded hex bytes☆63Feb 5, 2022Updated 4 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Collection of Cheat dumps for Research and Detection.☆16Jan 4, 2026Updated 3 months ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Jun 9, 2022Updated 3 years ago
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- IDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes☆170Aug 15, 2025Updated 7 months ago
- ImGui DX11 Hack☆14Mar 24, 2022Updated 4 years ago
- How to retro theme your Ghidra☆36Feb 24, 2026Updated last month
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆859Feb 2, 2024Updated 2 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆31Feb 15, 2022Updated 4 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆50Oct 10, 2022Updated 3 years ago
- Research notes☆133Dec 6, 2024Updated last year
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 6 years ago
- ☆17Feb 23, 2025Updated last year
- ☆24Oct 30, 2024Updated last year
- Small programs and scripts that do not require their own repositories☆138Feb 24, 2022Updated 4 years ago
- Take a QEMU binary, copy the dependencies into a chroot☆11Oct 5, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collection of slides for security presentations I've given in various forums☆14Mar 21, 2026Updated 3 weeks ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆26Mar 19, 2025Updated last year
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ☆36Jun 20, 2022Updated 3 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆112Feb 8, 2025Updated last year
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- a small curation of created/stolen scripts for reverse engineering☆12May 3, 2024Updated last year
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆43Dec 17, 2024Updated last year
- Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3☆17Feb 25, 2023Updated 3 years ago
- VMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when th…☆15May 20, 2020Updated 5 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- UnpacMe IDA Byte Search☆28Nov 20, 2023Updated 2 years ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆66Apr 15, 2024Updated last year