☆13Oct 10, 2018Updated 7 years ago
Alternatives and similar repositories for Reverse
Users that are interested in Reverse are comparing it to the libraries listed below
Sorting:
- ☆44Dec 31, 2016Updated 9 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- DNS File EXfiltration☆45Apr 12, 2024Updated last year
- ☆12Jan 25, 2020Updated 6 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 6 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- ☆36Updated this week
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- A collection of useful radare2 scripts!☆32Feb 2, 2018Updated 8 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Updated this week
- A Python Package for the Google Chrome Dev Protocol [asyncio base]☆23Mar 31, 2023Updated 2 years ago
- A curated list of my GitHub stars!☆40Updated this week
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆19Feb 9, 2025Updated last year
- zero trust access platform installation scripts with docker, docker swarm, microk8s, k3s, k8s zero-trust-network-access☆29Jun 12, 2025Updated 9 months ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆34Feb 1, 2026Updated last month
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Inclu…☆24Dec 26, 2025Updated 2 months ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- A Python package and command-line interface (CLI) tool for asynchronous OSINT username enumeration using the WhatsMyName dataset☆29Feb 16, 2026Updated last month
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- Virtualization done for .NET made as a plugin for ConfuserEX.☆30Aug 29, 2018Updated 7 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- A python script that converts input character strings to QR Code using emojis. The output can be copied & pasted where desired.☆12Jun 25, 2019Updated 6 years ago
- WhatsApp statistics toolkit mirror☆10Mar 24, 2019Updated 6 years ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- ☆16Jun 4, 2019Updated 6 years ago
- ObscurityLabs RedTeam C# Toolkit☆122Sep 3, 2019Updated 6 years ago