vitalysim / reverse-engineering
List of awesome reverse engineering resources
☆7Updated 5 years ago
Alternatives and similar repositories for reverse-engineering:
Users that are interested in reverse-engineering are comparing it to the libraries listed below
- Mobile phone PWN tools and scripts☆14Updated 4 years ago
- Tutorials for getting started with Pwntools☆12Updated 2 years ago
- an Advance Google Dorks based Web SearchEngine☆9Updated 7 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 3 years ago
- All xxx-arsenal repos in one☆15Updated 6 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 4 years ago
- Install popular tools used while pentesting & playing labs☆14Updated 3 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆13Updated 2 months ago
- Packet sniffer using scapy☆18Updated 5 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆12Updated 5 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆37Updated 4 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆9Updated 7 years ago
- A centralized place to collect USB Ninja payloads☆17Updated 6 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Android-PIN-Bruteforce☆17Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 3 years ago
- Android pin cracker☆11Updated 3 years ago
- An Open Source Intelligence Framework to investigate and keep track of the investigation of a certain individual☆15Updated last year
- Various Crypter Project☆9Updated 11 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- ☆9Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆12Updated 6 years ago
- Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and saf…☆26Updated 4 years ago
- Tools and scripts for penetration testing☆18Updated 4 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- The LAZY script will make your life easier, and of course faster.☆9Updated 7 years ago