A curated list of awesome reversing resources
☆4,468Aug 19, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-reversing
Users that are interested in awesome-reversing are comparing it to the libraries listed below
Sorting:
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,092May 27, 2022Updated 3 years ago
- Defund the Police.☆13,486Jun 7, 2024Updated last year
- A list of Reverse Engineering articles, books, and papers☆2,651May 2, 2023Updated 2 years ago
- List of awesome reverse engineering resources☆9,965Jul 29, 2023Updated 2 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,762Apr 3, 2024Updated last year
- Course materials for Modern Binary Exploitation by RPISEC☆5,939Dec 9, 2021Updated 4 years ago
- A collection of resources for linux reverse engineering☆2,074Jun 2, 2022Updated 3 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,313Dec 7, 2020Updated 5 years ago
- A list of web application security☆6,797Feb 27, 2026Updated last week
- A collection of links related to Linux kernel security and exploitation☆6,368Updated this week
- List of Awesome Red Teaming Resources☆7,809Dec 28, 2023Updated 2 years ago
- Course materials for Malware Analysis by RPISEC☆4,002Aug 26, 2022Updated 3 years ago
- A Collection of Hacks in IoT Space so that we can address them (hopefully).☆2,391May 16, 2020Updated 5 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆25,470Jan 25, 2026Updated last month
- ⭐️ A curated list of awesome forensic analysis tools and resources☆4,934Mar 1, 2026Updated last week
- A curated list of CTF frameworks, libraries, resources and softwares☆11,312Jul 22, 2024Updated last year
- List of Awesome Advanced Windows Exploitation References☆1,547Jan 13, 2022Updated 4 years ago
- A repository for learning various heap exploitation techniques.☆8,450Jan 15, 2026Updated last month
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,959Feb 24, 2025Updated last year
- A collected list of awesome security talks☆4,195Feb 17, 2026Updated 2 weeks ago
- A collection of android security related resources☆9,248Mar 1, 2026Updated last week
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,879Sep 1, 2021Updated 4 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,314Updated this week
- ✍️ A curated list of CVE PoCs.☆3,481Jan 4, 2022Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,066Jan 11, 2026Updated last month
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,908Oct 20, 2025Updated 4 months ago
- A list of IDA Plugins☆3,808May 31, 2024Updated last year
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,038Feb 15, 2026Updated 3 weeks ago
- A curated list of awesome infosec courses and training resources.☆5,594Nov 21, 2025Updated 3 months ago
- A curated list of Awesome Threat Intelligence resources☆9,872Jan 19, 2026Updated last month
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,868Mar 1, 2026Updated last week
- CTF framework and exploit development library☆13,293Mar 2, 2026Updated last week
- UNIX-like reverse engineering framework and command-line toolset☆23,206Updated this week
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆5,451Jan 15, 2024Updated 2 years ago
- Reverse engineering focusing on x64 Windows.☆5,767Sep 10, 2025Updated 5 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,909Feb 23, 2026Updated 2 weeks ago
- A powerful and user-friendly binary analysis platform!☆8,531Updated this week
- A Coverage Explorer for Reverse Engineers☆2,509Feb 14, 2026Updated 3 weeks ago
- A collection of hacking / penetration testing resources to make you better!☆16,832Mar 12, 2024Updated last year