Stars
The FLARE team's open-source tool to identify capabilities in executable files.
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
Collection of Cyber Threat Intelligence sources from the deep and dark web
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Community curated list of templates for the nuclei engine to find security vulnerabilities.
httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.
Find, verify, and analyze leaked credentials
Ghidra is a software reverse engineering (SRE) framework
Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabling collaboration to tackle trending vulnerabilities on the …
dnSpyEx / dnSpy
Forked from dnSpy/dnSpyUnofficial revival of the well known .NET debugger and assembly editor, dnSpy
☁️ Curated Cloud OSINT resources — dorks, tools, and techniques for AWS, Azure, GCP, Oracle Cloud, and other major providers reconnaissance
Fast passive subdomain enumeration tool.
Standard collection of rules for capa: the tool for enumerating the capabilities of programs
Python tool for converting files and office documents to Markdown.
Microsoft Threat Intelligence Security Tools
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Terminal-based toolkit for GitHub data analysis.
Import and export tools for elasticsearch & opensearch
A curated list of Awesome Threat Intelligence resources
A curated list of Game Boy development resources such as tools, docs, emulators, related projects and open-source ROMs.
A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.
A living guide to lesser-known and evasive Windows API abuses used in malware, with practical reverse engineering notes, YARA detections, and behavioral indicators.