List of awesome reverse engineering resources
☆10,014Jul 29, 2023Updated 2 years ago
Alternatives and similar repositories for reverse-engineering
Users that are interested in reverse-engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,450Updated this week
- Reverse engineering focusing on x64 Windows.☆5,801Sep 10, 2025Updated 7 months ago
- A curated list of awesome reversing resources☆4,479Aug 19, 2023Updated 2 years ago
- Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tool…☆4,905Sep 1, 2021Updated 4 years ago
- A list of Reverse Engineering articles, books, and papers☆2,663May 2, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of hacking / penetration testing resources to make you better!☆16,916Mar 12, 2024Updated 2 years ago
- Defund the Police.☆13,587Jun 7, 2024Updated last year
- A collection of resources for linux reverse engineering☆2,079Jun 2, 2022Updated 3 years ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,962Dec 9, 2021Updated 4 years ago
- Tutorials, tools, and more as related to reverse engineering video games.☆5,430Jun 20, 2024Updated last year
- UNIX-like reverse engineering framework and command-line toolset☆23,397Updated this week
- Course materials for Malware Analysis by RPISEC☆4,008Aug 26, 2022Updated 3 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆109,935Jan 18, 2025Updated last year
- Free and Open Source Reverse Engineering Platform powered by rizin☆18,637Apr 1, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ghidra is a software reverse engineering (SRE) framework☆66,637Updated this week
- A collection of awesome penetration testing resources, tools and other shiny things☆25,773Jan 25, 2026Updated 2 months ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,792Apr 3, 2024Updated 2 years ago
- Reverse Engineer's Toolkit☆5,175May 1, 2025Updated 11 months ago
- A collection of links related to Linux kernel security and exploitation☆6,399Mar 7, 2026Updated last month
- A repository for learning various heap exploitation techniques.☆8,583Mar 26, 2026Updated 2 weeks ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- A curated list of CTF frameworks, libraries, resources and softwares☆11,434Jul 22, 2024Updated last year
- CTF framework and exploit development library☆13,353Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,517Mar 20, 2026Updated 3 weeks ago
- List of Awesome Red Teaming Resources☆7,878Dec 28, 2023Updated 2 years ago
- Offensive Software Exploitation Course☆2,508May 31, 2023Updated 2 years ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,083Mar 26, 2026Updated 2 weeks ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,953Sep 10, 2025Updated 7 months ago
- A list of IDA Plugins☆3,821May 31, 2024Updated last year
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,107May 27, 2022Updated 3 years ago
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,283Updated this week
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,905Apr 1, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 🐶 A curated list of Web Security materials and resources.☆13,268Feb 27, 2026Updated last month
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,986Feb 24, 2025Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,189Jan 11, 2026Updated 3 months ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,925Oct 20, 2025Updated 5 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,044Updated this week
- Materials for Windows Malware Analysis training (volume 1)☆2,031Jul 1, 2024Updated last year
- Some setup scripts for security research tools.☆9,345Mar 1, 2026Updated last month