PokediamondDecompilation of Pokémon Diamond/Pearl
Stars: ✭ 110 (-94.57%)
MedusaAn open source interactive disassembler
Stars: ✭ 946 (-53.31%)
Js InterpreterA sandboxed JavaScript interpreter in JavaScript.
Stars: ✭ 1,296 (-36.03%)
EstaInterpreted language and bytecode VM of my own design written in Rust [Unmaintained]
Stars: ✭ 28 (-98.62%)
Android UnpackerAndroid Unpacker presented at Defcon 22: Android Hacker Protection Level 0
Stars: ✭ 944 (-53.41%)
PiroguePiRogue is a small device meant to ease network interception and analysis.
Stars: ✭ 90 (-95.56%)
Dotnet Assembly GrapherReverse engineering and software quality assurance tool for .NET assemblies
Stars: ✭ 21 (-98.96%)
SputterEthereum Virtual Machine (EVM) implementation
Stars: ✭ 111 (-94.52%)
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-98.96%)
KeyloggerA powerful C keylogger for Windows.
Stars: ✭ 89 (-95.61%)
Liko 12LIKO-12 is an open source fantasy computer made using LÖVE.
Stars: ✭ 811 (-59.97%)
Barf ProjectBARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
Stars: ✭ 1,280 (-36.82%)
RomdumpEFI bios rom dumping tools
Stars: ✭ 14 (-99.31%)
QuickjsThe official repo is at bellard/quickjs.
Stars: ✭ 1,429 (-29.47%)
R2m2radare2 + miasm2 = ♥
Stars: ✭ 86 (-95.76%)
ScreverserReverse engineer for Smart Contracts
Stars: ✭ 13 (-99.36%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (-93.83%)
AlbatrossAlbatross: orchestrate and manage MirageOS unikernels with Solo5
Stars: ✭ 85 (-95.8%)
StingrayIDAPython plugin for finding function strings recursively
Stars: ✭ 110 (-94.57%)
EvilclippyA cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
Stars: ✭ 1,224 (-39.59%)
E4vmA small portable virtual machine that would run Erlang on embedded systems
Stars: ✭ 124 (-93.88%)
Bin2llvmA binary to LLVM translator
Stars: ✭ 108 (-94.67%)
YuriavgengineA visual programming AVG engine / VM based on .NET
Stars: ✭ 80 (-96.05%)
1hostsDNS filter-/blocklists | safe. private. clean. browsing!
Stars: ✭ 85 (-95.8%)
Ergo Pe Av🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.
Stars: ✭ 130 (-93.58%)
AtmosphereAtmosphere cloud platform
Stars: ✭ 7 (-99.65%)
Sandboxed ApiGenerates sandboxes for C/C++ libraries automatically
Stars: ✭ 1,260 (-37.81%)
KeypatchMulti-architecture assembler for IDA Pro. Powered by Keystone Engine.
Stars: ✭ 939 (-53.65%)
Pe SieveScans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).
Stars: ✭ 1,783 (-11.99%)
HyperplatformIntel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.
Stars: ✭ 925 (-54.34%)
Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-95.85%)
Deer ExecutorAn executor for online judge —— 基于Go语言实现的代码评测工具
Stars: ✭ 23 (-98.86%)
SonyheadphonesclientA {Windows, macOS, Linux} client recreating the functionality of the Sony Headphones app
Stars: ✭ 123 (-93.93%)
Il2cppinspectorPowerful automated tool for reverse engineering Unity IL2CPP binaries
Stars: ✭ 901 (-55.53%)
VerminThe smart virtual machines manager. A modern CLI for Vagrant Boxes.
Stars: ✭ 110 (-94.57%)
Ret Syncret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
Stars: ✭ 896 (-55.77%)
Az2tfSee the new version here:
Stars: ✭ 83 (-95.9%)
Apk Utilities🛠 Tools and scripts to manipulate Android APKs
Stars: ✭ 134 (-93.39%)
LookinsidetheboxBreaks the encryption and obfuscation layers that Dropbox applies to their modified Python interpreter.
Stars: ✭ 80 (-96.05%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-99.16%)
Teleshadow3Telegram Desktop Session Stealer
Stars: ✭ 83 (-95.9%)
Lime Minera simple hidden silent XMR miner.
Stars: ✭ 109 (-94.62%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-94.67%)
TaghaMinimal, low-level, fast, and self-contained register-based bytecode virtual machine/runtime environment.
Stars: ✭ 79 (-96.1%)
DithumbMinimal ARM/Thumb linear sweep disassembler similar to objdump
Stars: ✭ 5 (-99.75%)
Slideswon't maintain
Stars: ✭ 79 (-96.1%)
Information Security TasksThis repository is created only for infosec professionals whom work day to day basis to equip ourself with uptodate skillset, We can daily contribute daily one hour for day to day tasks and work on problem statements daily, Please contribute by providing problem statements and solutions
Stars: ✭ 108 (-94.67%)
Botw Re NotesReverse engineering notes and tools for The Legend of Zelda: Breath of the Wild
Stars: ✭ 78 (-96.15%)
KiewtaiA port of Kaitai to the Hiew hex editor
Stars: ✭ 108 (-94.67%)
Flare Fakenet Ng[Suspended] FakeNet-NG - Next Generation Dynamic Network Analysis Tool
Stars: ✭ 1,214 (-40.08%)
BashacksSet of functions to increase productivity while hacking with Bash
Stars: ✭ 138 (-93.19%)
Kivm🌟This is a pure C++ implementation of Java Virtual Machine (only Java 8 is supported). Inspired by Hotspot In Action.
Stars: ✭ 137 (-93.24%)
AmsiscannerA C/C++ implementation of Microsoft's Antimalware Scan Interface
Stars: ✭ 134 (-93.39%)