mentebinaria / retoolkit
Reverse Engineer's Toolkit
☆4,885Updated 10 months ago
Alternatives and similar repositories for retoolkit:
Users that are interested in retoolkit are comparing it to the libraries listed below
- Portable Executable reversing tool with a friendly GUI☆2,896Updated 2 months ago
- Reverse engineering focusing on x64 Windows.☆5,300Updated 6 months ago
- Materials for Windows Malware Analysis training (volume 1)☆1,964Updated 7 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,090Updated 3 weeks ago
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,578Updated 3 years ago
- Program for determining types of files for Windows, Linux and MacOS.☆8,146Updated this week
- A curated list of awesome reversing resources☆4,183Updated last year
- Scanning APK file for URIs, endpoints & secrets.☆5,125Updated 4 months ago
- Network Analysis Tool☆3,190Updated last year
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆11,783Updated last week
- List of awesome reverse engineering resources☆9,144Updated last year
- The all-in-one browser extension for offensive security professionals 🛠☆5,955Updated last month
- Collection of methodology and test case for various web vulnerabilities.☆6,251Updated 6 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,131Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆6,922Updated this week
- Resources for Windows exploit development☆1,554Updated 3 years ago
- Proof-of-concept codes created as part of security research done by Google Security Team.☆1,863Updated 3 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆16,485Updated 2 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,528Updated last year
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆7,702Updated this week
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆4,846Updated last year
- ☆2,493Updated 2 years ago
- All about bug bounty (bypasses, payloads, and etc)☆6,098Updated last year
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,408Updated 2 years ago
- Adversary tradecraft detection, protection, and hunting☆2,271Updated this week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆5,988Updated 2 weeks ago
- A list of resources for those interested in getting started in bug bounties☆11,018Updated 6 months ago
- Windows Exploit Suggester - Next Generation☆4,325Updated last week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,717Updated this week
- Offensive Software Exploitation Course☆2,352Updated last year