bluec0re / reversing-radare2View external linksLinks
A reversing series with radare2
☆50Oct 24, 2016Updated 9 years ago
Alternatives and similar repositories for reversing-radare2
Users that are interested in reversing-radare2 are comparing it to the libraries listed below
Sorting:
- Converts IDA Pro signatures to C++ Detours☆13Jan 4, 2017Updated 9 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Another radare2 gui for windows☆39Feb 22, 2017Updated 8 years ago
- Source code to the Reverse Engineering Challenges for the CSAW 2009 competition, as well as the "scoreboard" system.☆32Nov 16, 2009Updated 16 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Jan 11, 2015Updated 11 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Jul 21, 2020Updated 5 years ago
- Volatility plugins☆12Feb 19, 2015Updated 10 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Feb 18, 2017Updated 8 years ago
- A series of tutorials about radare2 framework from https://www.megabeets.net☆528Jan 17, 2021Updated 5 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago
- ☆24Sep 26, 2017Updated 8 years ago
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆24Sep 29, 2024Updated last year
- 收集的各大公司发布的物联网安全年度报告☆13Jul 31, 2017Updated 8 years ago
- ☆12Jun 24, 2017Updated 8 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- Supplement to radare2-explorations.☆34Jan 4, 2017Updated 9 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- Collection of IDA scripts☆42Sep 20, 2017Updated 8 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Embedded OS for IoT☆17May 12, 2021Updated 4 years ago
- Tools to work on Android Full Disk Encryption (FDE).☆61Feb 3, 2015Updated 11 years ago
- "its like OAB in python because snake"☆16Feb 5, 2018Updated 8 years ago
- A Toolkit to assist with the investigation of Sandboxing software☆49Jan 4, 2016Updated 10 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- ☆16Dec 2, 2019Updated 6 years ago