xryw32 / Lisa-dbgLinks
it's a cli debugger written in rust, it allows the placement of breakpoints, modifying elements at addresses, modifying the value of registers and other nice little things
☆16Updated last year
Alternatives and similar repositories for Lisa-dbg
Users that are interested in Lisa-dbg are comparing it to the libraries listed below
Sorting:
- this is a small pe64 file analyzer in c++ with winapi, I didn't do it in the best way but hey, it's a small project like that that I tho…☆15Updated last year
- it's a small program written in rust with only the standard library to analyze the headers of an elf64 file☆14Updated last year
- this is a translator of assembly to C language written in rust, THE PROJECT IS UNDER DEVELOPMENT!!☆17Updated last year
- it's a small random project that I made, it allows you to dump the code of a running process with some nice options and that's it, pleas…☆10Updated last year
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆106Updated last year
- ⚡ Dynamically generated your Root-me.org stats for your github readmes☆23Updated 11 months ago
- 🧞♂️ malware analysis☆37Updated last year
- A collection of malware families and malware samples which use the Rust programming language.☆200Updated this week
- Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.☆39Updated 5 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- Discord HTTP requests interception POC, including backup codes requests, for educational purposes only.☆24Updated last year
- A full CTF Website Server & Frontend | Extremely customizable☆59Updated last year
- Osint tool to recover authors and emails on GitHub☆15Updated 6 months ago
- Your new favorite tool for pentesting.☆11Updated last year
- 🚀 Blazing fast and Powerful Stealer, no popo made with python☆27Updated last year
- Reverse Engineering and Malware Analysis Roadmap☆540Updated 3 months ago
- tricks I discovered while playing king of the hill☆17Updated 2 years ago
- Obfuscate the bytes of your payload with an association dictionary☆74Updated 2 months ago
- Polymorphic Command & Control☆101Updated 10 months ago
- A set of tools and resources for analysis of Havoc C2☆26Updated last year
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆171Updated 5 months ago
- Complete Windows usermode rootkit with custom C2 server, dropper, and EDR bypass. Features: privilege escalation, process/file/registry h…☆16Updated 3 weeks ago
- Powerful RSA cracker for CTFs. Supports RSA, X509, OPENSSH, PKCS#12, PKCS#7, and CSR in PEM and DER formats.☆146Updated last week
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Updated 4 years ago
- yep full list of virustotal machines, OG REPO☆141Updated 2 months ago
- Koth - TryHackMe Tricks☆189Updated 2 years ago
- A reverse shell for Windows and Linux written in C.☆84Updated 3 years ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Updated 9 months ago
- Collection of steganography tools for images and text☆42Updated 2 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆209Updated 5 months ago