A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning variables based on their usage.
☆19Oct 8, 2025Updated 5 months ago
Alternatives and similar repositories for GhidraDeepSeekDecomprove
Users that are interested in GhidraDeepSeekDecomprove are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- a medium scraper that you need.☆18Nov 11, 2025Updated 4 months ago
- A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code se…☆54Nov 3, 2025Updated 4 months ago
- Reconizer is all-in-one subdomain enumeration tool that has capabilities to find the maximum number of subdomains of a root domain.☆18Jul 14, 2024Updated last year
- ZHttp is a Kotlin-based, type-safe, asynchronous/synchronous, and thread-safe HTTP Client Library built for all JVM projects (Android, Sp…☆15Oct 5, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Modified version of Process monitor that bypasses procmon detection for anti-debuggers☆24May 6, 2024Updated last year
- ☆24Dec 16, 2020Updated 5 years ago
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 4 months ago
- ☆13Mar 29, 2021Updated 5 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 10 months ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Sep 3, 2022Updated 3 years ago
- Small project to generate fake DLLs based on an executable's import table☆24May 6, 2020Updated 5 years ago
- Docker baseimage for GTK3 Broadway☆14Nov 10, 2022Updated 3 years ago
- Cracking PDF password protection via hashcat.☆15Dec 24, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- 🛡️ Open-source binary protection toolkit for Windows PE. Nanomite, VM protection, anti-debug, and more.☆58Feb 8, 2026Updated last month
- ☆12Dec 14, 2021Updated 4 years ago
- Nuclear Powered Command-Line Tools☆12Nov 21, 2018Updated 7 years ago
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- GitLab Attack TOolkit☆34Oct 8, 2025Updated 5 months ago
- SysCalling is an educational project demonstrating state-of-the-art syscall execution techniques for bypassing user-space EDR controls in…☆14Dec 8, 2024Updated last year
- CORSER is a Golang CLI Application for Advanced CORS Misconfiguration Detection☆60Oct 26, 2024Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- "A photon or an electron is not a thing, it is a description of a relationship." ― R. A. Delmonico☆14Sep 22, 2020Updated 5 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- ☆18Feb 13, 2026Updated last month
- takes shellcode bad-bytes and banishes them, returning cleaned shellcode with preserved functionalities☆60Mar 1, 2026Updated 3 weeks ago
- The dataset in the paper "Detecting '0-Day' Vulnerability: An Empirical Study of Secret Security Patch in OSS", which appears in the 2019…☆13Aug 9, 2023Updated 2 years ago
- Collection of open-source nuclear education outreach material☆15Nov 24, 2022Updated 3 years ago
- Godot interactive grass with path2D☆13Apr 4, 2023Updated 2 years ago
- Browser-based Android security auditing tool.☆65Feb 6, 2026Updated last month
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- ☆50Jul 9, 2025Updated 8 months ago
- ☆12Apr 7, 2022Updated 3 years ago
- Runefinder: locate Unicode characters by name. Simplest sensible implementations.☆18Mar 13, 2026Updated 2 weeks ago
- App with Server Side Template Injection (SSTI) vulnerability - possible RCE - in Flask. Free vulnerable app for ethical hacking / penetra…☆16Sep 15, 2022Updated 3 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Golang Automation Framework for Cobalt Strike using the Rest API☆57Dec 4, 2025Updated 3 months ago