wasmkit / diswasmLinks
Decompiler and reverse engineering tool for wasm binaries
☆38Updated 8 months ago
Alternatives and similar repositories for diswasm
Users that are interested in diswasm are comparing it to the libraries listed below
Sorting:
- Ghidra Wasm plugin with disassembly and decompilation support☆337Updated last month
- View8 - Decompiles serialized V8 objects back into high-level readable code.☆276Updated last year
- Pure-JS bindings to control Frida from node.js & browsers☆42Updated 3 months ago
- Hermes bytecode disassembler and assembler☆78Updated 2 months ago
- A guide to choosing between different Android Emulator options for Reverse Engineers☆111Updated 2 years ago
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, even…☆180Updated last year
- GhidRust: Rust decompiler plugin for Ghidra☆314Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.☆566Updated 3 months ago
- Inspect and instrument React Native applications at runtime☆82Updated 10 months ago
- Dalvik bytecode disassembler and graph view☆67Updated last year
- Frida hook generator for Ghidra☆127Updated 3 weeks ago
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆30Updated last year
- Dynamic injection tool for Linux/Android☆179Updated 8 months ago
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆145Updated last year
- jni.h compiled for Ghidra☆86Updated 5 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆90Updated last year
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆393Updated 8 months ago
- Compile frida scripts into injectable libraries or executables that inject themselfs☆71Updated last week
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆69Updated this week
- View8 - Decompiles serialized V8 objects back into high-level readable code.☆71Updated 3 months ago
- Modified Emscripten compiler with LLVM-level obfuscation☆63Updated last year
- LLVM Pass to save Reverse Engineers from Automation☆110Updated 5 months ago
- MCP stdio server for radare2☆87Updated last week
- Binary Ninja plugin to analyze and simplify obfuscated code☆165Updated 2 months ago
- MCP stdio server for frida☆123Updated 4 months ago
- Javascript library for modifying WebAssembly binaries quickly and memory efficiently☆102Updated 10 months ago
- Unpack any pkg application☆96Updated 3 months ago
- Binary Ninja debugger☆265Updated last week
- Notes for my video on running an ARM64 Android emulator in Azure☆38Updated last year
- Write dynamic binary analysis tools in Python☆118Updated 2 months ago