mentebinaria / retoolkitLinks
Reverse Engineer's Toolkit
☆5,038Updated 3 months ago
Alternatives and similar repositories for retoolkit
Users that are interested in retoolkit are comparing it to the libraries listed below
Sorting:
- Materials for Windows Malware Analysis training (volume 1)☆1,998Updated last year
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,477Updated this week
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆12,564Updated last week
- Portable Executable reversing tool with a friendly GUI☆3,227Updated 3 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,604Updated last week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,338Updated 3 weeks ago
- Adversary tradecraft detection, protection, and hunting☆2,372Updated last week
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,495Updated last month
- Offensive Software Exploitation Course☆2,375Updated 2 years ago
- List of awesome reverse engineering resources☆9,534Updated 2 years ago
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,725Updated 3 years ago
- Reverse engineering focusing on x64 Windows.☆5,460Updated last month
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,108Updated this week
- Network Analysis Tool☆3,271Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,349Updated last year
- A curated list of awesome reversing resources☆4,318Updated 2 years ago
- OFRAK: unpack, modify, and repack binaries.☆1,977Updated 2 weeks ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,187Updated 3 months ago
- Proof-of-concept codes created as part of security research done by Google Security Team.☆1,870Updated 4 years ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,637Updated this week
- State-of-the-art native debugging tools☆3,431Updated this week
- Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro and Rekall …☆1,337Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,249Updated this week
- Research code & papers from members of vx-underground.☆1,283Updated 3 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,457Updated last month
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,097Updated last month
- Scanning APK file for URIs, endpoints & secrets.☆5,412Updated 4 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,244Updated last month
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,192Updated 2 weeks ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,326Updated last week