A reversing series with radare2
☆50Oct 24, 2016Updated 9 years ago
Alternatives and similar repositories for reversing-radare2
Users that are interested in reversing-radare2 are comparing it to the libraries listed below
Sorting:
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Another radare2 gui for windows☆39Feb 22, 2017Updated 9 years ago
- Source code to the Reverse Engineering Challenges for the CSAW 2009 competition, as well as the "scoreboard" system.☆32Nov 16, 2009Updated 16 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Jan 11, 2015Updated 11 years ago
- Migrate your Hipchat history to Mattermost☆10Mar 2, 2026Updated last week
- ☆10Apr 8, 2018Updated 7 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Jul 21, 2020Updated 5 years ago
- Volatility plugins☆12Feb 19, 2015Updated 11 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆527Jan 17, 2021Updated 5 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- ☆24Sep 26, 2017Updated 8 years ago
- ☆12Jun 24, 2017Updated 8 years ago
- A X11 based context/productivity tool written in V☆13Mar 12, 2023Updated 2 years ago
- 收集的各大公司发布的物联网安全年度报告☆13Jul 31, 2017Updated 8 years ago
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- Supplement to radare2-explorations.☆34Jan 4, 2017Updated 9 years ago
- Minimalist browser support for Opal (useful for virtual-dom-based libraries/frameworks)☆14Mar 17, 2024Updated last year
- A wrapper around bits of LFE to make using Erjang (Java) from LFE more convenient☆18Apr 23, 2014Updated 11 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Universal minimum GitHub CI scripts and issue templates for a V project☆14Sep 14, 2023Updated 2 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Tools to work on Android Full Disk Encryption (FDE).☆61Feb 3, 2015Updated 11 years ago
- LLDB python scripts☆26Apr 5, 2013Updated 12 years ago
- Various small Unix utilities for ~/bin☆71Dec 21, 2025Updated 2 months ago