Assisting Go Analysis and Reversing
☆97Nov 13, 2025Updated 3 months ago
Alternatives and similar repositories for agar
Users that are interested in agar are comparing it to the libraries listed below
Sorting:
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated last month
- Rust symbol recovery tool☆78Feb 19, 2026Updated last week
- Generate Go bindings for shared C libraries.☆15Jul 13, 2024Updated last year
- IDA plugin helping reverse-engineering rust binaries☆32Jul 31, 2024Updated last year
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Symbol Recovery Tool for Nuitka Binaries☆79Dec 25, 2024Updated last year
- CoRCTF 2025 - CoRPhone: Android Kernel Pwn☆52Sep 3, 2025Updated 5 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆15Nov 1, 2021Updated 4 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.☆12Feb 2, 2023Updated 3 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection…☆21Dec 1, 2021Updated 4 years ago
- Go fastcall analysis for ida decompiler☆46Jun 25, 2025Updated 8 months ago
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- iOS crash log symbolication tool for jailbroken devices☆18Jan 30, 2026Updated 3 weeks ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆76Updated this week
- ☆26Jul 18, 2024Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆26Dec 20, 2025Updated 2 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- x86-64 Automated test data generator☆26Aug 18, 2025Updated 6 months ago
- ☆21Feb 23, 2022Updated 4 years ago
- LLMON 🍋 - The World's First Web Adversarial AI Firewall☆40Jan 3, 2026Updated last month
- Bindiff_for_IDA9 (support 9.0rc1 9.0 9.1)☆94May 23, 2025Updated 9 months ago
- Utilities scripts and Python module to facilitate executing idapython scripts in IDA.☆30Dec 5, 2025Updated 2 months ago
- ☆23Dec 16, 2023Updated 2 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Aug 11, 2023Updated 2 years ago
- A cross-platform C++ framework for building Windows shellcode☆158Feb 9, 2026Updated 2 weeks ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- Cortex EDR Ransomware protection Bypass☆26Feb 8, 2025Updated last year
- 基于 eBPF 的 Android 文件访问监控与拦截工具☆61Updated this week
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- ☆53Jan 17, 2026Updated last month
- PrimitiveInjection by using Read, Write and Allocation Primitives.☆53Jun 21, 2025Updated 8 months ago
- An external attack surface monitoring (EASM) tool to find externally accessible documents.☆54Feb 2, 2026Updated 3 weeks ago
- ☆42Updated this week
- IDA Pro plugin that helps reconstruct structures☆259Jan 15, 2026Updated last month
- Instrumenting a binary without source code to bypass anti-debug checks☆38Sep 25, 2021Updated 4 years ago