Stars
Helping Ethical Hackers use LLMs in 50 Lines of Code or less..
A True Instrumentable Binary Emulation Framework
A few basic bytecode interpreters used as example code in a series of articles
Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software verification or just emulate code.
Function signature matching and signature generation plugin for Binary Ninja
IDA plugin for UEFI firmware analysis and reverse engineering automation
A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl
Helper scripts for analyzing NativeAOT compiled .NET binaries with Ghidra
Swift Apps Reverse Engineering reading book
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Simple HS256, HS384 & HS512 JWT token brute force cracker.
FlowDroid Static Data Flow Tracker
A step-by-step tutorial for Soot (a Java static analysis framework)
Facebook AI Research Sequence-to-Sequence Toolkit written in Python.
Code for our paper "Modelobfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems" that has been published by ISSTA'23
Primary Git Repository for the Zephyr Project. Zephyr is a new generation, scalable, optimized, secure RTOS for multiple hardware architectures.
Universal and Transferable Attacks on Aligned Language Models
Win32 and Kernel abusing techniques for pentesters
拼多多apk内嵌提权代码,及动态下发dex分析
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.
Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2
A summary of 200+ CTF blockchain challenges