TrashDBG the world's worse debugger
☆23Feb 17, 2022Updated 4 years ago
Alternatives and similar repositories for trashdbg
Users that are interested in trashdbg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code snips and notes☆141Mar 10, 2022Updated 4 years ago
- The best theme for x64dbg!☆88Aug 5, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 4 years ago
- ☆16May 15, 2021Updated 4 years ago
- ☆14Aug 8, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- IDA plugin for quickly copying disassembly as encoded hex bytes☆63Feb 5, 2022Updated 4 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Collection of Cheat dumps for Research and Detection.☆16Jan 4, 2026Updated 3 months ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆41Jun 9, 2022Updated 3 years ago
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- IDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes☆169Aug 15, 2025Updated 8 months ago
- ImGui DX11 Hack☆14Mar 24, 2022Updated 4 years ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆860Feb 2, 2024Updated 2 years ago
- ☆31Apr 24, 2022Updated 4 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆51Oct 10, 2022Updated 3 years ago
- Research notes☆134Apr 14, 2026Updated 2 weeks ago
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 6 years ago
- ☆17Feb 23, 2025Updated last year
- ☆24Oct 30, 2024Updated last year
- Small programs and scripts that do not require their own repositories☆138Feb 24, 2022Updated 4 years ago
- Take a QEMU binary, copy the dependencies into a chroot☆11Oct 5, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Collection of slides for security presentations I've given in various forums☆14Mar 21, 2026Updated last month
- A guide on how to write fast and memory friendly YARA rules☆168Feb 11, 2025Updated last year
- Anything related to Ghidra☆12Apr 22, 2019Updated 7 years ago
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated last year
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ☆36Jun 20, 2022Updated 3 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆112Feb 8, 2025Updated last year
- a small curation of created/stolen scripts for reverse engineering☆12May 3, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆43Dec 17, 2024Updated last year
- Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3☆17Feb 25, 2023Updated 3 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- UnpacMe IDA Byte Search☆28Nov 20, 2023Updated 2 years ago
- Assortment of hashing algorithms used in malware☆396Feb 8, 2026Updated 2 months ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆66Apr 15, 2024Updated 2 years ago
- Scudo useful files☆10Jul 3, 2022Updated 3 years ago