Stars
Buildroot, making embedded Linux easy. Note that this is not the official repository, but only a mirror. The official Git repository is at https://gitlab.com/buildroot.org/buildroot/. Do not open i…
An in-game UI for exploring, debugging and modifying IL2CPP and Mono Unity games.
The World's First Universal Mod Loader for Unity Games compatible with both Il2Cpp and Mono
💊 Application to use ReVanced on Android
Automatic SQL injection and database takeover tool
GFPGAN aims at developing Practical Algorithms for Real-world Face Restoration.
JakeCoxon / imgui-win98
Forked from ocornut/imguiDear ImGui: Bloat-free Immediate Mode Graphical User interface for C++ with minimal dependencies
Dear ImGui: Bloat-free Graphical User interface for C++ with minimal dependencies
IDA 2016 plugin contest winner! Symbolic Execution just one-click away!
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, a…
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
The FLARE team's open-source tool to identify capabilities in executable files.
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).