mentebinaria / retoolkitLinks
Reverse Engineer's Toolkit
☆4,974Updated last month
Alternatives and similar repositories for retoolkit
Users that are interested in retoolkit are comparing it to the libraries listed below
Sorting:
- Portable Executable reversing tool with a friendly GUI☆3,104Updated last month
- Materials for Windows Malware Analysis training (volume 1)☆1,989Updated 11 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆12,190Updated this week
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,667Updated 3 years ago
- Adversary tradecraft detection, protection, and hunting☆2,342Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,207Updated 4 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,316Updated 2 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,345Updated this week
- A curated list of awesome reversing resources☆4,265Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,545Updated this week
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,322Updated last month
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,100Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,159Updated last month
- A True Instrumentable Binary Emulation Framework☆5,444Updated 3 weeks ago
- Reverse engineering focusing on x64 Windows.☆5,401Updated 10 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,229Updated 8 months ago
- A list of cyber-chef recipes and curated links☆2,083Updated 11 months ago
- List of awesome reverse engineering resources☆9,371Updated last year
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,432Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,271Updated 9 months ago
- ☆2,507Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,428Updated 2 years ago
- Adversary Emulation Framework☆9,404Updated last week
- Scanning APK file for URIs, endpoints & secrets.☆5,303Updated 2 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,137Updated this week
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,321Updated last month
- Proof-of-concept codes created as part of security research done by Google Security Team.☆1,867Updated 4 years ago
- Course materials for Malware Analysis by RPISEC☆3,862Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆6,414Updated 2 months ago
- Defund the Police.☆12,609Updated 11 months ago