☆25Nov 24, 2025Updated 3 months ago
Alternatives and similar repositories for jadx-collaboration
Users that are interested in jadx-collaboration are comparing it to the libraries listed below
Sorting:
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Virtual Tagger Plugin is a Cutter plugin that significantly improves handling and analysis of vtables and virtual functions☆16Mar 23, 2023Updated 2 years ago
- Fuzzers implemented with libafl to evaluate several techniques on fuzzbench☆13Oct 10, 2024Updated last year
- Jadx plugin that shows AI analysis of a method/class in a separate view.☆35Nov 7, 2024Updated last year
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Elastic Security Labs' malware analysis and reverse engineering library☆52Feb 13, 2026Updated 2 weeks ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54May 26, 2025Updated 9 months ago
- Docker container to use blutter (dart decompiler for android apps)☆22Sep 18, 2024Updated last year
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- Small POC code that detects known root-related apps by attempting to launch their activities and monitoring security exception.☆26Mar 21, 2025Updated 11 months ago
- BPF Processor for IDA Python☆53Aug 27, 2018Updated 7 years ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆50Jun 16, 2025Updated 8 months ago
- ☆48Nov 26, 2025Updated 3 months ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Apr 29, 2025Updated 10 months ago
- ☠️ Code for the Defcon Workshop☆23Aug 6, 2024Updated last year
- Yet another rule generator for Yara☆29Jun 6, 2025Updated 8 months ago
- Pishi is a code coverage tool like kcov for macOS.☆75Apr 17, 2025Updated 10 months ago
- Tasks and services for PASECA CTF 2019 (24-26 aug)☆21Mar 20, 2021Updated 4 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Apr 12, 2023Updated 2 years ago
- A security checking tool☆106Feb 4, 2026Updated last month
- Slides about HyperDbg☆39Feb 11, 2026Updated 3 weeks ago
- ☆75Jan 1, 2026Updated 2 months ago
- ☆30Sep 6, 2022Updated 3 years ago
- A YARA rule generator☆62Feb 8, 2026Updated 3 weeks ago
- A Qemu Proxmox Template builder project using Packer☆72Dec 5, 2025Updated 3 months ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Jul 6, 2024Updated last year
- ☆84Dec 11, 2024Updated last year
- Clone of JSAI static analysis framework☆13Jul 29, 2017Updated 8 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- BPE Tokenizer implementations in C# for Anthropic, OpenAI LLM offerings☆15Oct 5, 2023Updated 2 years ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆22Jan 3, 2026Updated 2 months ago
- Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519☆61Aug 14, 2024Updated last year
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆41Updated this week
- ☆61Jun 28, 2025Updated 8 months ago
- Put All Mirror in ONE☆12Feb 18, 2026Updated 2 weeks ago
- Generate a PDB file given the old PDB file and an address mapping☆52Aug 3, 2025Updated 7 months ago