☆169Nov 10, 2025Updated 4 months ago
Alternatives and similar repositories for decompai
Users that are interested in decompai are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Binary code coverage visualizer plugin for Ghidra - just without crashes on unknown insns☆20Nov 2, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- A script to copy your Highlights from an Amazon Kindle device☆14Apr 27, 2024Updated last year
- A Qlaunch rewrite☆12Jun 2, 2019Updated 6 years ago
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆25Jan 23, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Nov 24, 2025Updated 4 months ago
- All-in-one macOS binary analysis: Mach-O parsing, ARM64 disassembly, code signatures, and debugging.☆96Feb 17, 2026Updated last month
- MCP for Pwn☆238Mar 12, 2026Updated 2 weeks ago
- A tool that dumps offsets from a game's memory buffer☆12Sep 18, 2021Updated 4 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆101Jan 3, 2026Updated 2 months ago
- Code lifting for executing a visionOS library os macOS using QBDL and QBDI☆22Sep 30, 2024Updated last year
- Some V8 n-day exploits that I've written☆53Mar 1, 2026Updated 3 weeks ago
- ☆21Sep 25, 2023Updated 2 years ago
- Red Hat JBoss Data Grid 7 OpenShift container images☆10Jan 26, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Deobfuscator for hCaptcha HSW WASM challenge.☆57Aug 31, 2025Updated 6 months ago
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆25Jan 3, 2025Updated last year
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆30Oct 16, 2025Updated 5 months ago
- PCB design for the initial prototype of OBC hardware, to interface with LaunchPad.☆10Sep 19, 2018Updated 7 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Headless AI agent for deterministic reverse engineering.☆92Dec 9, 2025Updated 3 months ago
- A Simple Drools DSL Example☆13Jun 17, 2022Updated 3 years ago
- LLFuzz: An Over-the-Air Dynamic Testing Framework for Cellular Baseband Lower Layers☆56Mar 20, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆51Jun 1, 2025Updated 9 months ago
- llvm powered deobfuscation of a vm-based protection☆54Feb 25, 2026Updated last month
- RE for champions☆15Updated this week
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated last month
- A high-performance C++ framework for emulating executable binaries☆128Nov 23, 2025Updated 4 months ago
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆15Mar 10, 2026Updated 2 weeks ago
- Windows API sniffer and dumper utility for reverse engineering.☆13Jun 22, 2023Updated 2 years ago
- ☆26Jan 7, 2024Updated 2 years ago
- WinDbg Symbols Caching Proxy.☆17Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, X86)☆12Aug 22, 2017Updated 8 years ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆60May 20, 2025Updated 10 months ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- Python tool to generate crafted JWTs, exploiting the algorithm confusion vulnerability in JWT signature validation. Useful for security …☆25Mar 22, 2025Updated last year
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- Standalone C version of the MSM8974 TrustZone exploit☆28Sep 30, 2020Updated 5 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago