Stars
📚 Modern C++ Tutorial: C++11/14/17/20 On the Fly | https://changkun.de/modern-cpp/
Free and Open Source Reverse Engineering Platform powered by rizin
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
a lightweight, multi-platform, multi-architecture hook framework.
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
A library that lets you use reflection without any restriction above Android P
Static analyzer for C/C++ based on the theory of Abstract Interpretation.
Proof-of-concept codes created as part of security research done by Google Security Team.
A Dynamic Binary Instrumentation framework based on LLVM.
Obfuscation library based on C++20 and metaprogramming
孤挺花(Armariris) -- 由上海交通大学密码与计算机安全实验室维护的LLVM混淆框架
Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.
A security focused static analysis tool for Android and Java applications.
Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution.
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Andromeda - Interactive Reverse Engineering Tool for Android Applications
Find JNI function signatures in APK and apply to reverse-engineering tools.
Library for structured fuzzing with protobuffers
Flexible Register/Instruction Extender aNd Documentation
Native binary for testing Android phones for the Rowhammer bug
梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)
An application to dynamically inject a shared object into a running process on ARM architectures.
Collection of Android reverse engineering scripts
Fuzzing harness for testing proprietary image codecs supported by Skia on Android
scheib / chromium
Forked from chromium/chromium• scheib's chromium fork. • 2017 and earlier, this served as the GitHub chromium mirror. In 2018 the mirror was moved to https://github.com/chromium/chromium as an official mirror updated by chromi…