mentebinaria / retoolkitLinks
Reverse Engineer's Toolkit
☆5,141Updated 8 months ago
Alternatives and similar repositories for retoolkit
Users that are interested in retoolkit are comparing it to the libraries listed below
Sorting:
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,728Updated last week
- Materials for Windows Malware Analysis training (volume 1)☆2,016Updated last year
- Portable Executable reversing tool with a friendly GUI☆3,429Updated 2 months ago
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,534Updated 3 weeks ago
- Offensive Software Exploitation Course☆2,390Updated 2 years ago
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,821Updated 4 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,471Updated last year
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,073Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,482Updated 2 months ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,177Updated 2 weeks ago
- A curated list of awesome reversing resources☆4,423Updated 2 years ago
- Reverse engineering focusing on x64 Windows.☆5,578Updated 3 months ago
- Scanning APK file for URIs, endpoints & secrets.☆5,769Updated 4 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,520Updated 2 months ago
- Adversary Emulation Framework☆10,436Updated this week
- Rust Weaponization for Red Team Engagements.☆2,968Updated last year
- ☆2,510Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,413Updated 2 months ago
- Windows kernel and user mode emulation.☆1,814Updated last month
- List of awesome reverse engineering resources☆9,850Updated 2 years ago
- Adversary tradecraft detection, protection, and hunting☆2,422Updated this week
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,594Updated 3 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,449Updated 2 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,765Updated 5 months ago
- Resources for Windows exploit development☆1,639Updated 4 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,289Updated 2 months ago
- Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro and Rekall …☆1,338Updated 3 years ago
- Organized list of my malware development resources☆1,679Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,434Updated 9 months ago
- Tools and Techniques for Red Team / Penetration Testing☆8,047Updated 9 months ago