mentebinaria / retoolkitLinks
Reverse Engineer's Toolkit
☆5,108Updated 6 months ago
Alternatives and similar repositories for retoolkit
Users that are interested in retoolkit are comparing it to the libraries listed below
Sorting:
- Materials for Windows Malware Analysis training (volume 1)☆2,011Updated last year
- Network Analysis Tool☆3,292Updated 2 years ago
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,520Updated 4 months ago
- Offensive Software Exploitation Course☆2,388Updated 2 years ago
- Portable Executable reversing tool with a friendly GUI☆3,336Updated this week
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆2,226Updated last year
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,633Updated last week
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,777Updated 4 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆12,858Updated this week
- Scanning APK file for URIs, endpoints & secrets.☆5,686Updated 2 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,452Updated 3 months ago
- A curated list of awesome reversing resources☆4,382Updated 2 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,480Updated this week
- The all-in-one browser extension for offensive security professionals 🛠☆6,310Updated 10 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,946Updated last month
- Proof-of-concept codes created as part of security research done by Google Security Team.☆1,875Updated 4 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,284Updated 3 months ago
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!☆2,462Updated last week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,602Updated 8 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,345Updated 3 weeks ago
- The essential toolkit for reversing, malware analysis, and cracking☆931Updated 4 months ago
- Research code & papers from members of vx-underground.☆1,309Updated 3 years ago
- List of awesome reverse engineering resources☆9,690Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆3,007Updated last year
- Reverse engineering focusing on x64 Windows.☆5,528Updated last month
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,075Updated 2 years ago
- OFRAK: unpack, modify, and repack binaries.☆1,990Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,358Updated 7 months ago
- Volatility 3.0 development☆3,625Updated 3 weeks ago
- Resources for Windows exploit development☆1,624Updated 3 years ago