mentebinaria / retoolkitLinks
Reverse Engineer's Toolkit
β4,993Updated last month
Alternatives and similar repositories for retoolkit
Users that are interested in retoolkit are comparing it to the libraries listed below
Sorting:
- The all-in-one browser extension for offensive security professionals πβ6,130Updated 5 months ago
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source toolβ¦β4,685Updated 3 years ago
- Portable Executable reversing tool with a friendly GUIβ3,134Updated last month
- Materials for Windows Malware Analysis training (volume 1)β1,991Updated 11 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.β5,382Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering envβ¦β7,390Updated last month
- Collection of malware source code for a variety of platforms in an array of different programming languages.β16,892Updated 6 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β12,313Updated this week
- Network Analysis Toolβ3,245Updated 2 years ago
- Offensive Software Exploitation Courseβ2,371Updated 2 years ago
- A curated list of awesome reversing resourcesβ4,281Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Poβ¦β3,264Updated 4 months ago
- βοΈ A curated list of awesome forensic analysis tools and resourcesβ4,349Updated last week
- Wi-Fi Exploitation Frameworkβ2,555Updated this week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β9,606Updated last month
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandβ¦β7,259Updated 8 months ago
- Windows kernel and user mode emulation.β1,667Updated 2 months ago
- Scanning APK file for URIs, endpoints & secrets.β5,323Updated 2 months ago
- Proof-of-concept codes created as part of security research done by Google Security Team.β1,869Updated 4 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,536Updated 3 weeks ago
- Collection of methodology and test case for various web vulnerabilities.β6,452Updated 3 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β6,134Updated 3 months ago
- Adversary tradecraft detection, protection, and huntingβ2,347Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)β7,651Updated last week
- Red Teaming Tactics and Techniquesβ4,288Updated 10 months ago
- The pattern matching swiss knifeβ8,839Updated 2 weeks ago
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,081Updated last week
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.β5,761Updated last year
- Reverse engineering focusing on x64 Windows.β5,422Updated 10 months ago
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,186Updated last month