mentebinaria / retoolkitLinks
Reverse Engineer's Toolkit
☆5,057Updated 4 months ago
Alternatives and similar repositories for retoolkit
Users that are interested in retoolkit are comparing it to the libraries listed below
Sorting:
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,501Updated 2 months ago
- Materials for Windows Malware Analysis training (volume 1)☆1,999Updated last year
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆12,624Updated last week
- Portable Executable reversing tool with a friendly GUI☆3,254Updated 2 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,504Updated this week
- Offensive Software Exploitation Course☆2,378Updated 2 years ago
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,742Updated 4 years ago
- ☆2,513Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,404Updated last month
- Scanning APK file for URIs, endpoints & secrets.☆5,437Updated 3 weeks ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,677Updated last week
- The all-in-one browser extension for offensive security professionals 🛠☆6,248Updated 8 months ago
- A curated list of awesome reversing resources☆4,331Updated 2 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,598Updated 6 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,302Updated 2 months ago
- Network Analysis Tool☆3,274Updated 2 years ago
- A curated list of awesome Ghidra materials☆1,290Updated 3 years ago
- Adversary tradecraft detection, protection, and hunting☆2,374Updated last month
- Leaked pentesting manuals given to Conti ransomware crooks☆1,054Updated 4 years ago
- a drop-in replacement for Nmap powered by shodan.io☆3,103Updated 4 months ago
- Reverse Engineers' Hex Editor☆2,411Updated this week
- articles☆13,304Updated 2 years ago
- Defund the Police.☆12,960Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,504Updated last month
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,426Updated this week
- List of awesome reverse engineering resources☆9,561Updated 2 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,218Updated this week
- Windows kernel and user mode emulation.☆1,746Updated 5 months ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,419Updated last week
- IntelOwl: manage your Threat Intelligence at scale☆4,308Updated this week