Stars
📚 Modern C++ Tutorial: C++11/14/17/20 On the Fly | https://changkun.de/modern-cpp/
Free and Open Source Reverse Engineering Platform powered by rizin
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
a lightweight, multi-platform, multi-architecture hook framework.
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
A library that lets you use reflection without any restriction above Android P
Static analyzer for C/C++ based on the theory of Abstract Interpretation.
A Dynamic Binary Instrumentation framework based on LLVM.
Obfuscation library based on C++20 and metaprogramming
孤挺花(Armariris) -- 由上海交通大学密码与计算机安全实验室维护的LLVM混淆框架
Repository for materials of "Modern fuzzing of C/C++ Projects" workshop.
A security focused static analysis tool for Android and Java applications.
Angora is a mutation-based fuzzer. The main goal of Angora is to increase branch coverage by solving path constraints without symbolic execution.
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Andromeda - Interactive Reverse Engineering Tool for Android Applications
Find JNI function signatures in APK and apply to reverse-engineering tools.
Library for structured fuzzing with protobuffers
Flexible Register/Instruction Extender aNd Documentation
Native binary for testing Android phones for the Rowhammer bug
梆梆企业加固详细逆向分析过程, 包含两种对该加固的脱壳机(直接解密classes0.jar和基于frida hook)
An application to dynamically inject a shared object into a running process on ARM architectures.
Collection of Android reverse engineering scripts
Fuzzing harness for testing proprietary image codecs supported by Skia on Android
Street Party is a suite of tools that allows the RTP streams of video conferencing implementations to be viewed and modified.