Reverse Engineering tools, scripts, and general commentary
☆59Mar 7, 2019Updated 6 years ago
Alternatives and similar repositories for re
Users that are interested in re are comparing it to the libraries listed below
Sorting:
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 8 years ago
- API functions for Malware Research☆35Jul 9, 2019Updated 6 years ago
- A binary analysis framework☆133Dec 17, 2020Updated 5 years ago
- Cheat Engine alternative written in Rust☆12Nov 15, 2022Updated 3 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- Sys Mon! Why yu nuh logging dat?☆12Dec 10, 2018Updated 7 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- cloud-based interactive security exercises☆14Jul 13, 2020Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 3 months ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Vagrant files to bootstrap VM for CTFs☆11Aug 21, 2016Updated 9 years ago
- api-tracer is a tiny (useless) tracer☆17Feb 28, 2023Updated 3 years ago
- Haskell parser for the REIL intermediate language (currently a work-in-progress)☆11Jan 12, 2018Updated 8 years ago
- This is a repository to house convenient things for the 2019 PCDC competition.☆13Apr 13, 2019Updated 6 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- ☆94Nov 16, 2018Updated 7 years ago
- ☆92Oct 24, 2018Updated 7 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- A tool for studying JavaScript malware.☆15Feb 23, 2026Updated last week
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Scriptable Binary Ninja plugin to enable automated coverage analysis and visualization☆136Feb 15, 2023Updated 3 years ago
- Windows RID Hijacking persistence technique☆178Nov 20, 2024Updated last year
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Aug 11, 2023Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- ☆18Mar 28, 2023Updated 2 years ago