☆108Jul 18, 2017Updated 8 years ago
Alternatives and similar repositories for Reversing
Users that are interested in Reversing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆110Nov 21, 2013Updated 12 years ago
- ☆208May 3, 2023Updated 3 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- ☆279Apr 6, 2023Updated 3 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Augmenting Static Analysis Using Pintool: Ablation☆39Aug 4, 2016Updated 9 years ago
- IDA Patcher is a plugin for Hex-Ray's IDA Pro disassembler designed to enhance IDA's ability to patch binary files and memory.☆119Mar 12, 2016Updated 10 years ago
- ☆13Aug 12, 2015Updated 10 years ago
- My collection of IDAPython scripts.☆40Jan 7, 2016Updated 10 years ago
- BinSourcerer☆92Mar 1, 2022Updated 4 years ago
- ☆136Jun 11, 2021Updated 4 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- The CrowdDetox plugin for Hex-Rays automatically removes junk code and variables from Hex-Rays function decompilations.☆165May 3, 2021Updated 5 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- A few IDAPython scripts to generate class hierarchy diagrams from IDBs☆35Jan 10, 2012Updated 14 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆141Apr 17, 2017Updated 9 years ago
- The IDA Toolbag is a plugin providing supplemental functionality to Hex-Rays IDA Pro disassembler.☆315Jul 1, 2016Updated 9 years ago
- Automatically disable and remove malware and blacklisted piracy markets to help support developers and themers☆12Oct 13, 2015Updated 10 years ago
- ☆433May 3, 2023Updated 3 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Labeless is a multipurpose IDA Pro plugin system for labels/comments synchronization with a debugger backend, with complex memory dumping…☆578Feb 23, 2026Updated 2 months ago
- IDA Pro resources, scripts, and configurations☆185May 15, 2026Updated last week
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- ☆18Aug 31, 2014Updated 11 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆160Jul 4, 2016Updated 9 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- A python library for building and using hash databases.☆22May 11, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 9 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago