TrashDBG the world's worse debugger
☆23Feb 17, 2022Updated 4 years ago
Alternatives and similar repositories for trashdbg
Users that are interested in trashdbg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code snips and notes☆141Mar 10, 2022Updated 4 years ago
- The best theme for x64dbg!☆91Aug 5, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- ☆16May 15, 2021Updated 4 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- ☆14Aug 8, 2022Updated 3 years ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆65Feb 5, 2022Updated 4 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- Collection of Cheat dumps for Research and Detection.☆16Jan 4, 2026Updated 2 months ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Jun 9, 2022Updated 3 years ago
- Ghidra plugin for HashDB☆21Oct 11, 2023Updated 2 years ago
- IDA Pro plugin which improves work with HexRays decompiler and helps in process of reconstruction structures and classes☆170Aug 15, 2025Updated 7 months ago
- How to retro theme your Ghidra☆36Feb 24, 2026Updated 3 weeks ago
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 3 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Feb 15, 2022Updated 4 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆50Oct 10, 2022Updated 3 years ago
- Research notes☆133Dec 6, 2024Updated last year
- bash script to prepare Debian machines for OSINT use☆11Apr 10, 2020Updated 5 years ago
- ☆17Feb 23, 2025Updated last year
- ☆24Oct 30, 2024Updated last year
- Small programs and scripts that do not require their own repositories☆139Feb 24, 2022Updated 4 years ago
- A custom shell with I/O redirection and pipelining capabilities, implemented in C.☆10Dec 29, 2017Updated 8 years ago
- Collection of slides for security presentations I've given in various forums☆14Updated this week
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆27Mar 19, 2025Updated last year
- ☆36Jun 20, 2022Updated 3 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 5 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆112Feb 8, 2025Updated last year
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- a small curation of created/stolen scripts for reverse engineering☆12May 3, 2024Updated last year
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆43Dec 17, 2024Updated last year
- Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3☆17Feb 25, 2023Updated 3 years ago
- VMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when th…☆15May 20, 2020Updated 5 years ago
- Assortment of hashing algorithms used in malware☆396Feb 8, 2026Updated last month
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Jan 23, 2022Updated 4 years ago
- UnpacMe IDA Byte Search☆29Nov 20, 2023Updated 2 years ago