Android Reverse Engineering Software belongs to ARE VM from the Honeynet Project
☆56Feb 2, 2012Updated 14 years ago
Alternatives and similar repositories for AREsoft
Users that are interested in AREsoft are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Sep 2, 2017Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- ☆11Aug 9, 2018Updated 7 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A binary instrumentation tool based on Xposed framework for cracking enterprise level anti-tamper and obfuscation techniques, debunking m…☆15Dec 16, 2018Updated 7 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆40Mar 8, 2015Updated 11 years ago
- The Demo for CVE-2018-1000006☆39Jan 25, 2018Updated 8 years ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- A generic DEX file obfuscator and munger☆266Mar 24, 2016Updated 10 years ago
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- android安全工具大全☆41Jun 3, 2015Updated 10 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- iOS Simulator, I got you.☆28Jul 31, 2017Updated 8 years ago
- Simple tool to monitor network changes over time and trigger alerts☆15Mar 11, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PowerShell cmdlet to push PowerShell attack modules to a remote system via PSRemoting and if required enable WinRM remotely.☆28Sep 13, 2016Updated 9 years ago
- Parse and tamper DEX file☆17Dec 12, 2016Updated 9 years ago
- A tool for analyzing code coverage and path coverage without using xdebug.☆23Sep 13, 2012Updated 13 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- oneHookLibraryIOS☆11Dec 29, 2020Updated 5 years ago
- A search tool for IDA☆70Nov 26, 2016Updated 9 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago