inversecos / ios-dontpopmeView external linksLinks
dontpopme bitches
☆24Jun 16, 2022Updated 3 years ago
Alternatives and similar repositories for ios-dontpopme
Users that are interested in ios-dontpopme are comparing it to the libraries listed below
Sorting:
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- ☆26Jul 11, 2022Updated 3 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- The future home for a library able to parse in memory lot of complex structures from common shared libs and syscalls☆15Apr 4, 2023Updated 2 years ago
- ☆15Feb 12, 2023Updated 3 years ago
- ☆35Jan 27, 2025Updated last year
- ☆15Oct 3, 2024Updated last year
- All challenges I created for CTF☆12Jun 7, 2021Updated 4 years ago
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆47Jan 28, 2023Updated 3 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Dec 17, 2024Updated last year
- Identifies metadata of .NET binary files.☆21Apr 3, 2024Updated last year
- Powershell & Python XOR 2 Files☆15Nov 22, 2018Updated 7 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Mar 20, 2020Updated 5 years ago
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- ☆27Nov 26, 2024Updated last year
- An IDA plugin which demangles Rust function names☆35Dec 11, 2023Updated 2 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22May 19, 2022Updated 3 years ago
- Write-ups for crackmes and CTF challenges☆53Nov 24, 2022Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 7 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Tantō slices functions into more consumable chunks☆78Dec 8, 2025Updated 2 months ago
- Parses the WMI object database....looking for persistence☆34Dec 12, 2019Updated 6 years ago
- SEP firmware splitter, made in rust.☆41Oct 11, 2024Updated last year
- idenLib (Library Function Identification) plugin for x32dbg☆41Feb 26, 2019Updated 6 years ago
- ☆78Jul 26, 2022Updated 3 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆37Nov 21, 2025Updated 2 months ago
- VirusTotal Intelligence Search☆40May 21, 2020Updated 5 years ago
- My talks and papers☆40Nov 24, 2025Updated 2 months ago
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 5 months ago
- ☆15Mar 21, 2025Updated 10 months ago
- ☆11Apr 12, 2023Updated 2 years ago
- How to access Marianas web?☆13Jan 18, 2021Updated 5 years ago
- ☆39Dec 10, 2024Updated last year
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- Extract filesystem data from DMG files☆49Jun 5, 2025Updated 8 months ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago