TrashDBG the world's worse debugger
☆23Feb 17, 2022Updated 4 years ago
Alternatives and similar repositories for trashdbg
Users that are interested in trashdbg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code snips and notes☆141Mar 10, 2022Updated 4 years ago
- The best theme for x64dbg!☆88Aug 5, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- ☆16May 15, 2021Updated 5 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Aug 8, 2022Updated 3 years ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆64Feb 5, 2022Updated 4 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- HashDB API hash lookup plugin for IDA Pro☆358May 5, 2026Updated 2 weeks ago
- IDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes☆170Aug 15, 2025Updated 9 months ago
- How to retro theme your Ghidra☆35Feb 24, 2026Updated 2 months ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆32Apr 24, 2022Updated 4 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆31Feb 15, 2022Updated 4 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆51Oct 10, 2022Updated 3 years ago
- Research notes☆134Apr 14, 2026Updated last month
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 6 years ago
- ☆24Oct 30, 2024Updated last year
- A custom shell with I/O redirection and pipelining capabilities, implemented in C.☆10Dec 29, 2017Updated 8 years ago
- Small programs and scripts that do not require their own repositories☆139Feb 24, 2022Updated 4 years ago
- Take a QEMU binary, copy the dependencies into a chroot☆11Oct 5, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆28Mar 19, 2025Updated last year
- Collection of slides for security presentations I've given in various forums☆14Mar 21, 2026Updated 2 months ago
- A guide on how to write fast and memory friendly YARA rules☆169Feb 11, 2025Updated last year
- Anything related to Ghidra☆12Apr 22, 2019Updated 7 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ☆37Jun 20, 2022Updated 3 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆112Feb 8, 2025Updated last year
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- a small curation of created/stolen scripts for reverse engineering☆12May 3, 2024Updated 2 years ago
- Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3☆17Feb 25, 2023Updated 3 years ago
- VMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when th…☆15May 20, 2020Updated 6 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago
- Assortment of hashing algorithms used in malware☆398Feb 8, 2026Updated 3 months ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆66Apr 15, 2024Updated 2 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆26Mar 22, 2018Updated 8 years ago