Assisting Go Analysis and Reversing
☆98Nov 13, 2025Updated 4 months ago
Alternatives and similar repositories for agar
Users that are interested in agar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rust symbol recovery tool☆81Feb 19, 2026Updated last month
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated 2 months ago
- Generate Go bindings for shared C libraries.☆18Jul 13, 2024Updated last year
- ☆27Jul 18, 2024Updated last year
- IDA plugin helping reverse-engineering rust binaries☆33Jul 31, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Symbol Recovery Tool for Nuitka Binaries☆85Dec 25, 2024Updated last year
- This tool can be useful for solving some reversing challenges in CTFs events.☆15Nov 1, 2021Updated 4 years ago
- VMLifter 是一个基于指令执行轨迹的语义提升工具,专注于值依赖驱动的程序语义重建 。☆47Mar 9, 2026Updated last month
- Terminal-based IDA disassembly, microcode and pseudocode dumper☆44Mar 11, 2026Updated 3 weeks ago
- Make You Happy!☆277Mar 24, 2026Updated 2 weeks ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 6 months ago
- Public repository of 2026 crackmes.one CTF RE challenge☆33Mar 10, 2026Updated last month
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- CoRCTF 2025 - CoRPhone: Android Kernel Pwn☆51Sep 3, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- abusing windows toast notifications for fun and user manipulation☆86Mar 20, 2026Updated 3 weeks ago
- Go fastcall analysis for ida decompiler☆46Jun 25, 2025Updated 9 months ago
- Agentic malware analysis environment with MCP-connected disassemblers, RE tooling, and structured workflows for Claude Code and Codex CLI…☆188Mar 22, 2026Updated 2 weeks ago
- ApplyCalleeType IDA Plugin 🤙 — Reborn. Single-file port to IDA Pro 9.3 with right-click menu, live prototype editor, and full SAL/MSDN p…☆59Mar 9, 2026Updated last month
- Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.☆12Feb 2, 2023Updated 3 years ago
- iOS crash log symbolication tool for jailbroken devices☆21Jan 30, 2026Updated 2 months ago
- Examples of various container types for Python and Golang☆15Aug 29, 2025Updated 7 months ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆81Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A New Exploitation Technique for Visual Studio Projects☆12Nov 5, 2023Updated 2 years ago
- 个人使用的 IDA Pro Plugins 集合☆40Jan 20, 2026Updated 2 months ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- Instrumenting a binary without source code to bypass anti-debug checks☆38Sep 25, 2021Updated 4 years ago
- Bindiff_for_IDA9 (support 9.0rc1 9.0 9.1)☆94May 23, 2025Updated 10 months ago
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆67Apr 3, 2026Updated last week
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- A cross-platform C++ framework for building Windows shellcode☆166Mar 4, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- ☆16Sep 25, 2024Updated last year
- WinDbg plugin to trace module transitions from a debugged driver.☆51Dec 22, 2025Updated 3 months ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆52Jan 19, 2026Updated 2 months ago
- ☆16Feb 27, 2026Updated last month
- ☆57Jul 2, 2025Updated 9 months ago