A tool that acts as an assistant for Reverse Engineering challenges in CTFs
☆16Jan 5, 2021Updated 5 years ago
Alternatives and similar repositories for RE-helper
Users that are interested in RE-helper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Reverse Engineering Assistant of your dreams☆31Dec 30, 2021Updated 4 years ago
- Python module for demangling rust function names☆19Apr 24, 2021Updated 4 years ago
- idaflirt-detector is Python scripts and IDA FLIRT signatures to detect statically linked libraries from stripped ELF file.☆12May 19, 2022Updated 3 years ago
- Tool to test different CTF scoring algorithms on real data☆17May 3, 2021Updated 4 years ago
- Symbolic execution engine for Whitespace.☆13May 30, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Upstream for Non Interactive Zero Knowledge CTF platform☆10May 21, 2020Updated 5 years ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- Discord bot focused on managing and organising CTFs / Security stuff☆18Nov 22, 2024Updated last year
- A declarative instruction decoder and disassembler generator using a custom DSL☆21Mar 12, 2026Updated last week
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- "Porting Syzkaller to ReactOS" GSoC 2020 Project by @freakston☆14Aug 4, 2020Updated 5 years ago
- ☆13Feb 22, 2022Updated 4 years ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- A simple Windows application that allows the user to pick between IDA installation for the given file.☆31Oct 11, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- Fix phone calls with Microsoft Teams☆15Feb 11, 2022Updated 4 years ago
- DeVAIC (Detection of Vulnerabilities in AI-generated Code) is a static code analyzer for security issues in Python code snippets. It dete…☆16Oct 24, 2025Updated 5 months ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆52Jan 19, 2026Updated 2 months ago
- Cloak, Honey, Trap: Proactive Defenses Against LLM Agents☆17Jul 9, 2025Updated 8 months ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 9 years ago
- a java decompiler demo☆15Mar 29, 2024Updated last year
- Chrome extension that redacts potentially sensitive information before querying ChatGPT☆12Aug 10, 2023Updated 2 years ago
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- An AI agent to use Ghidra with any AI.☆24Mar 31, 2025Updated 11 months ago
- Analysis Reports of Malwares☆14Jun 21, 2019Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆12Jan 11, 2025Updated last year
- Generatore di rumore scimmiesco in contesto di gare A/D☆11Jul 7, 2023Updated 2 years ago
- Data Structures and Algorithms (Swaminathan J)☆73Oct 6, 2020Updated 5 years ago
- This is totally not reversed from /usr/libexec/nvmefwupdater haha☆13Feb 25, 2021Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- Tool for using libc infoleaks to identify libc version from within your exploit.☆13Dec 29, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Awesome AI Agents☆22Apr 2, 2025Updated 11 months ago
- CLI enabling more autonomous black-box penetration tests using Large Language Models (LLMs)☆43Mar 14, 2026Updated last week
- inject luajit bytecode☆18Mar 21, 2022Updated 4 years ago
- ☆16Sep 27, 2021Updated 4 years ago