☆156Nov 10, 2025Updated 3 months ago
Alternatives and similar repositories for decompai
Users that are interested in decompai are comparing it to the libraries listed below
Sorting:
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 7 months ago
- A tool that dumps offsets from a game's memory buffer☆12Sep 18, 2021Updated 4 years ago
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆23Jan 23, 2026Updated last month
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆30Feb 19, 2026Updated 2 weeks ago
- Code lifting for executing a visionOS library os macOS using QBDL and QBDI☆21Sep 30, 2024Updated last year
- MCP for Pwn☆218Feb 27, 2026Updated last week
- All-in-one macOS binary analysis: Mach-O parsing, ARM64 disassembly, code signatures, and debugging.☆93Feb 17, 2026Updated 2 weeks ago
- Expand / Unshorten an exhaustive list of Shortened URL's☆19Feb 1, 2026Updated last month
- Arlo file format helper☆16Mar 7, 2024Updated 2 years ago
- CoWorks is a unified compositional serverless microservices framework over AWS, Flask and Airflow technologies.☆17Dec 18, 2025Updated 2 months ago
- A Qlaunch rewrite☆12Jun 2, 2019Updated 6 years ago
- A revival of the classic and legendary KsDumper☆39Nov 19, 2025Updated 3 months ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆26Jan 3, 2025Updated last year
- ☆21Sep 25, 2023Updated 2 years ago
- Headless AI agent for deterministic reverse engineering.☆91Dec 9, 2025Updated 2 months ago
- llvm powered deobfuscation of a vm-based protection☆52Feb 25, 2026Updated last week
- Userland exec PoC to be used as attack vector technique☆96Oct 23, 2025Updated 4 months ago
- Simple Packer PE File☆16Mar 8, 2019Updated 6 years ago
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Nov 24, 2025Updated 3 months ago
- ☆26Jan 7, 2024Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆100Jan 3, 2026Updated 2 months ago
- Integrate Ghidra's decompiler as an Ida plugin, this version has nice syntax highlighting, comments and other cool features.☆49Mar 23, 2021Updated 4 years ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆51Jun 1, 2025Updated 9 months ago
- ☆54Jan 17, 2026Updated last month
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆29Oct 16, 2025Updated 4 months ago
- Another™ MCP Server for Binary Ninja with superpower 🥵☆35May 13, 2025Updated 9 months ago
- IDA AArch64 processor extender extension: Adding support for ARMv8.5 memory tagging extension opcodes☆26Jul 6, 2020Updated 5 years ago
- Toolkit developed to reverse engineer Google's Nearby Connections API☆23Dec 11, 2018Updated 7 years ago
- Standalone C version of the MSM8974 TrustZone exploit☆27Sep 30, 2020Updated 5 years ago
- A parser for Microsoft PDB (Program Database) debugging information☆23Nov 5, 2024Updated last year
- RevEng.AI IDA Pro Plugin☆131Feb 23, 2026Updated last week
- ☆27Nov 7, 2023Updated 2 years ago
- C++ port of the fastmcp Python library☆98Feb 28, 2026Updated last week
- A high-performance C++ framework for emulating executable binaries☆128Nov 23, 2025Updated 3 months ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59May 20, 2025Updated 9 months ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year