mentebinaria / retoolkitLinks
Reverse Engineer's Toolkit
☆5,095Updated 5 months ago
Alternatives and similar repositories for retoolkit
Users that are interested in retoolkit are comparing it to the libraries listed below
Sorting:
- Materials for Windows Malware Analysis training (volume 1)☆2,005Updated last year
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,510Updated 3 months ago
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,758Updated 4 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,548Updated last week
- Portable Executable reversing tool with a friendly GUI☆3,286Updated last week
- Offensive Software Exploitation Course☆2,385Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,434Updated 2 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,282Updated 9 months ago
- Scanning APK file for URIs, endpoints & secrets.☆5,661Updated last month
- A curated list of awesome reversing resources☆4,359Updated 2 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,288Updated last month
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,894Updated last month
- Adversary tradecraft detection, protection, and hunting☆2,381Updated 2 weeks ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆12,761Updated this week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,258Updated 2 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,424Updated this week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,728Updated 3 weeks ago
- A True Instrumentable Binary Emulation Framework☆5,650Updated last month
- The Havoc Framework☆7,872Updated 3 months ago
- Web Attack Cheat Sheet☆4,329Updated last week
- Red Teaming Tactics and Techniques☆4,387Updated last year
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,457Updated last month
- Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro and Rekall …☆1,336Updated 3 years ago
- Gather and update all available and newest CVEs with their PoC.☆7,276Updated this week
- ☆2,506Updated 2 years ago
- List of awesome reverse engineering resources☆9,633Updated 2 years ago
- A curated list of awesome Ghidra materials☆1,308Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,240Updated last month
- The essential toolkit for reversing, malware analysis, and cracking☆927Updated 4 months ago
- OFRAK: unpack, modify, and repack binaries.☆1,986Updated last week