☆108Jul 18, 2017Updated 8 years ago
Alternatives and similar repositories for Reversing
Users that are interested in Reversing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AuditParser☆60Aug 28, 2013Updated 12 years ago
- ☆110Nov 21, 2013Updated 12 years ago
- ☆208May 3, 2023Updated 2 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- ☆278Apr 6, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- IDA Patcher is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's ability to patch binary files and memory.☆120Mar 12, 2016Updated 10 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- My collection of IDAPython scripts.☆40Jan 7, 2016Updated 10 years ago
- BinSourcerer☆92Mar 1, 2022Updated 4 years ago
- ☆136Jun 11, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- The CrowdDetox plugin for Hex-Rays automatically removes junk code and variables from Hex-Rays function decompilations.☆165May 3, 2021Updated 4 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Apr 17, 2017Updated 9 years ago
- The IDA Toolbag is a plugin providing supplemental functionality to Hex-Rays IDA Pro disassembler.☆316Jul 1, 2016Updated 9 years ago
- Automatically disable and remove malware and blacklisted piracy markets to help support developers and themers☆12Oct 13, 2015Updated 10 years ago
- ☆433May 3, 2023Updated 2 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- IDA Pro resources, scripts, and configurations☆175Apr 21, 2026Updated last week
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆578Feb 23, 2026Updated 2 months ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- ☆18Aug 31, 2014Updated 11 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆43Jul 5, 2013Updated 12 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A python library for building and using hash databases.☆22Apr 8, 2026Updated 3 weeks ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 9 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago