Lists (1)
Sort Name ascending (A-Z)
Stars
A simple run-only applescript disassembler
A curated list of resources about post-quantum cryptography.
CTF style challenge based on indirect syscalls for windows and control flow obfuscation using Vectored Exception Handling
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
Network traffic analysis tool for Attack & Defense CTF's
Attack & Defense CTF Farm based on DestructiveFarm
🔨 A modern multiple reverse shell sessions manager written in go
An index of Windows binaries, including download links for executables such as exe, dll and sys files
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts.
Quickly debug shellcode extracted during malware analysis
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Ghidra Wasm plugin with disassembly and decompilation support
IDA pro plugin to find crypto constants (and more)
Network analysis tool for Attack Defence CTF
📝 A markup-aware linter for prose built with speed and extensibility in mind.
Automated auditing, performance metrics, and best practices for the web.
Java Dynamic Reverse Engineering and Debugging Tool
Coppersmith's method for multivariate polynomials