Zeyad-Azima / GhidraDeepSeekDecomproveView external linksLinks
A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning variables based on their usage.
☆19Oct 8, 2025Updated 4 months ago
Alternatives and similar repositories for GhidraDeepSeekDecomprove
Users that are interested in GhidraDeepSeekDecomprove are comparing it to the libraries listed below
Sorting:
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- a medium scraper that you need.☆18Nov 11, 2025Updated 3 months ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 8 months ago
- zwatcher is a lightweight bash script for monitoring sub/domains or a list of sub/domains and javascript files. It compares HTTP status c…☆21Nov 23, 2025Updated 2 months ago
- ☆11Mar 25, 2024Updated last year
- ☆12Dec 10, 2023Updated 2 years ago
- ☆18Apr 27, 2025Updated 9 months ago
- ☆19Jul 14, 2025Updated 7 months ago
- This repository manages DSD lab code files.☆14Oct 29, 2021Updated 4 years ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- Used to grab banners from TCP services and search their contents for a specific string.☆16Feb 11, 2020Updated 6 years ago
- burp suite插件☆13Jul 9, 2023Updated 2 years ago
- Nuclear Powered Command-Line Tools☆12Nov 21, 2018Updated 7 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- ☆15Mar 17, 2025Updated 10 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- URL Encode Injection List☆13Sep 20, 2021Updated 4 years ago
- Like DLP☆11Jan 27, 2025Updated last year
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- Simple tool to send the json output from HTTPX to BBRF☆11Mar 30, 2023Updated 2 years ago
- This repo will contain the material for reversing flutter applications.☆52Jul 23, 2025Updated 6 months ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- Cracking PDF password protection via hashcat.☆14Dec 24, 2025Updated last month
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated 2 weeks ago
- A Simple heaptrack-compatible Heap Profiler for Windows C/C++ Applications☆12Jun 28, 2015Updated 10 years ago
- RE for champions☆15Jan 28, 2026Updated 2 weeks ago
- A Burp extension to Fuzz URLs for HTTP parser inconsistencies☆12Jan 9, 2024Updated 2 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- ☆13Feb 18, 2022Updated 3 years ago
- 5 Minutes script to bypass Sucuri Cloudproxy in Python by using js2py☆12Sep 3, 2019Updated 6 years ago
- ☆13Mar 29, 2021Updated 4 years ago
- PoC of Imagemagick's Arbitrary File Read☆12Jul 3, 2023Updated 2 years ago
- Integrate GoKart security static analysis to GitHub Actions☆10Jan 11, 2023Updated 3 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago