☆13Oct 10, 2018Updated 7 years ago
Alternatives and similar repositories for Reverse
Users that are interested in Reverse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Dec 31, 2016Updated 9 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- DNS File EXfiltration☆45Apr 12, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆19Updated this week
- ☆12Jan 25, 2020Updated 6 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Educational Java Bot Virus☆10Mar 14, 2020Updated 6 years ago
- Malware analyses and helpful scripts☆30May 26, 2022Updated 3 years ago
- ☆38Mar 19, 2026Updated 3 weeks ago
- CVE-2021-36955☆14Aug 15, 2023Updated 2 years ago
- A collection of useful radare2 scripts!☆32Feb 2, 2018Updated 8 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Updated this week
- A Python Package for the Google Chrome Dev Protocol [asyncio base]☆23Mar 31, 2023Updated 3 years ago
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆19Feb 9, 2025Updated last year
- zero trust access platform installation scripts with docker, docker swarm, microk8s, k3s, k8s zero-trust-network-access☆29Jun 12, 2025Updated 9 months ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆35Updated this week
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A curated list of my GitHub stars!☆42Updated this week
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Expression Injection (CVSS 10.0). Inclu…☆23Dec 26, 2025Updated 3 months ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- Virtualization done for .NET made as a plugin for ConfuserEX.☆30Aug 29, 2018Updated 7 years ago
- DarkRats Standalone HVNC☆26May 20, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A python script that converts input character strings to QR Code using emojis. The output can be copied & pasted where desired.☆12Jun 25, 2019Updated 6 years ago
- WhatsApp statistics toolkit mirror☆10Mar 24, 2019Updated 7 years ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated 3 weeks ago
- A Python package and command-line interface (CLI) tool for asynchronous OSINT username enumeration using the WhatsMyName dataset☆36Apr 4, 2026Updated last week
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago