TwitterxKeeping Twitter for macOS alive with code injection
Stars: ✭ 187 (+6.25%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+3174.43%)
Rebel FrameworkAdvanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+3.98%)
TextractorExtracts text from video games and visual novels. Highly extensible.
Stars: ✭ 656 (+272.73%)
InjectioniiiRe-write of Injection for Xcode in (mostly) Swift
Stars: ✭ 2,680 (+1422.73%)
Luject🍹A static injector of dynamic library for application (android, iphoneos, macOS, windows, linux)
Stars: ✭ 203 (+15.34%)
PinceA reverse engineering tool that'll supply the place of Cheat Engine for linux
Stars: ✭ 987 (+460.8%)
AtlasQuick SQLMap Tamper Suggester
Stars: ✭ 679 (+285.8%)
PcsgolhPCSGOLH - Pointless Counter-Strike: Global Offensive Lua Hooks. A open-source Lua API for CS:GO hacking written in modern C++
Stars: ✭ 56 (-68.18%)
Chimay RedMikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-64.2%)
MinjectMono Framework Interaction / Injection Library for .NET (C++/CLI)
Stars: ✭ 42 (-76.14%)
ReverseapkQuickly analyze and reverse engineer Android packages
Stars: ✭ 419 (+138.07%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+2264.77%)
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+620.45%)
HrshellHRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+9.66%)
Drv3 Tools(Not actively maintained, use DRV3-Sharp) Tools for extracting and re-injecting files for Danganronpa V3 for PC.
Stars: ✭ 13 (-92.61%)
Ios Debug Hacks🎯 Advanced debugging skills used in the iOS project development process, involves the dynamic debugging, static analysis and decompile of third-party libraries. iOS 项目开发过程中用到的高级调试技巧,涉及三方库动态调试、静态分析和反编译等领域
Stars: ✭ 595 (+238.07%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-83.52%)
Awesome HackingA collection of various awesome lists for hackers, pentesters and security researchers
Stars: ✭ 48,038 (+27194.32%)
Vac HooksHook WinAPI functions used by Valve Anti-Cheat. Log calls and intercept arguments & return values. DLL written in C.
Stars: ✭ 103 (-41.48%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-8.52%)
IpapatchPatch iOS Apps, The Easy Way, Without Jailbreak.
Stars: ✭ 3,837 (+2080.11%)
Hooksolinux动态链接库的注入修改查找工具 A tool for injection, modification and search of linux dynamic link library
Stars: ✭ 87 (-50.57%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+6414.77%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (+68.75%)
Tradfri HackingHacking IKEA TRÅDFRI products, such as light bulbs, window blinds and other accessories.
Stars: ✭ 367 (+108.52%)
Dll hook RsRust code to show how hooking in rust with a dll works.
Stars: ✭ 57 (-67.61%)
GamemaniptutorialA tutorial for manipulating the rendering of a game (generally to increase its quality) if you only have a binary available
Stars: ✭ 119 (-32.39%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+943.75%)
Anno1800 Mod LoaderThe one and only mod loader for Anno 1800, supports loading of unpacked RDA files, XML merging and Python mods.
Stars: ✭ 161 (-8.52%)
Attiny85RubberDucky like payloads for DigiSpark Attiny85
Stars: ✭ 169 (-3.98%)
AndroidlibraryAndroid library to reveal or obfuscate strings and assets at runtime
Stars: ✭ 162 (-7.95%)
MinesweeperA Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 23000 malicious cryptocurrency mining domains (cryptojacking).
Stars: ✭ 162 (-7.95%)
Umbrella androidOpen source Android, iOS and Web app for learning about and managing digital and physical security. From how to send a secure message to dealing with a kidnap. Umbrella has best practice guides in over 40 topics in multiple languages. Used daily by people working in high risk countries - journalists, activists, diplomats, business travelers etc.
Stars: ✭ 171 (-2.84%)
TsyringeLightweight dependency injection container for JavaScript/TypeScript
Stars: ✭ 2,761 (+1468.75%)
Hacking ToolSocial media & camera hacking & whatsapp virus & SMS bombing
Stars: ✭ 157 (-10.8%)
Frida Ios Dumppull decrypted ipa from jailbreak device
Stars: ✭ 2,223 (+1163.07%)
Elf Dump FixUtils use to dump android ELF from memory and do some fix including the ELF section header rebuilding
Stars: ✭ 166 (-5.68%)
Ethical HackingThis repository contains reference material & links for people willing to learn Ethical Hacking
Stars: ✭ 160 (-9.09%)
WascanWAScan - Web Application Scanner
Stars: ✭ 1,895 (+976.7%)
HacktricksWelcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Stars: ✭ 3,741 (+2025.57%)
Mandibulelinux elf injector for x86 x86_64 arm arm64
Stars: ✭ 171 (-2.84%)
BbreconPython library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-3.98%)
T14m4tAutomated brute-forcing attack tool.
Stars: ✭ 160 (-9.09%)
JsshellJSshell - JavaScript reverse/remote shell
Stars: ✭ 167 (-5.11%)
RbasefindA firmware base address search tool.
Stars: ✭ 159 (-9.66%)
UddbgA gdb like debugger that provide a runtime env to unicorn emulator and additionals features!
Stars: ✭ 159 (-9.66%)
Remote Desktop CachingThis tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Stars: ✭ 171 (-2.84%)
Dymerge🔓 A dynamic dictionary merger for successful dictionary based attacks.
Stars: ✭ 167 (-5.11%)
Zeebsploitweb scanner - exploitation - information gathering
Stars: ✭ 159 (-9.66%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-5.11%)
HardentheworldHarden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.
Stars: ✭ 158 (-10.23%)