mentebinaria / retoolkit
Reverse Engineer's Toolkit
β4,950Updated last week
Alternatives and similar repositories for retoolkit:
Users that are interested in retoolkit are comparing it to the libraries listed below
- The FLARE team's open-source tool to identify capabilities in executable files.β5,285Updated last week
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β12,084Updated 2 weeks ago
- The all-in-one browser extension for offensive security professionals πβ6,064Updated 4 months ago
- Offensive Software Exploitation Courseβ2,369Updated last year
- A curated list of awesome reversing resourcesβ4,249Updated last year
- Portable Executable reversing tool with a friendly GUIβ3,064Updated last week
- Materials for Windows Malware Analysis training (volume 1)β1,987Updated 10 months ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.β16,748Updated 5 months ago
- OFRAK: unpack, modify, and repack binaries.β1,941Updated last week
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source toolβ¦β4,642Updated 3 years ago
- List of awesome reverse engineering resourcesβ9,324Updated last year
- πΈ Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell β¦β6,873Updated last year
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,β¦β2,155Updated last month
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,548Updated 2 months ago
- My experiments in weaponizing Nim (https://nim-lang.org/)β2,926Updated 11 months ago
- Reverse engineering focusing on x64 Windows.β5,380Updated 9 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering envβ¦β7,218Updated last week
- Research code & papers from members of vx-underground.β1,230Updated 3 years ago
- Web Attack Cheat Sheetβ4,286Updated 3 weeks ago
- Red Teaming Tactics and Techniquesβ4,244Updated 8 months ago
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 andβ¦β1,427Updated 2 years ago
- Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro and Rekall β¦β1,326Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β6,238Updated this week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.β3,523Updated this week
- Adversary tradecraft detection, protection, and huntingβ2,328Updated this week
- Scanning APK file for URIs, endpoints & secrets.β5,256Updated last month
- Collection of various malicious functionality to aid in malware developmentβ1,636Updated last year
- Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!β2,337Updated this week
- βοΈ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-huntingβ4,042Updated last month
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,013Updated last month