vitalysim / reverse-engineering
List of awesome reverse engineering resources
☆7Updated 5 years ago
Alternatives and similar repositories for reverse-engineering:
Users that are interested in reverse-engineering are comparing it to the libraries listed below
- Mobile phone PWN tools and scripts☆14Updated 4 years ago
- Tutorial to create a bootable Kali USB drive with persistent storage.☆8Updated 7 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 3 years ago
- Firefox addon for a Man In The Middle detection☆12Updated 4 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- ☆9Updated 2 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆10Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 6 years ago
- ATM security list☆11Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 11 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 11 years ago
- Tutorials for getting started with Pwntools☆12Updated 2 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- Packet sniffer using scapy☆18Updated 4 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆14Updated last year
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Tools and scripts for penetration testing☆18Updated 4 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- A Python script to hack parrot drones automatically. It allows to spawn a shell on the drone to control it.☆12Updated 6 years ago
- Repository of tools used in my blog☆50Updated 10 months ago
- BunnyLogger is a BashBunny payload that uses PowerShell to log keystroke☆16Updated 2 years ago
- Telnet-2 allows to connect via Tor and define a custom timeout☆10Updated 5 years ago
- Find all cool documents on GOV and Info sites☆18Updated 5 years ago
- pen testing scripts☆11Updated 4 years ago