Stars
- All languages
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Dart
- Dockerfile
- Go
- HTML
- Java
- JavaScript
- Jinja
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- Makefile
- Markdown
- Mathematica
- Max
- Meson
- Nim
- OCaml
- OpenSCAD
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QMake
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- SMT
- Scala
- Shell
- Solidity
- Swift
- TeX
- TypeScript
- VBScript
- Vim Script
- XSLT
- YARA
Another LLVM-obfuscator based on LLVM-17. A fork of Arkari
A curated list of awesome Android Reverse Engineering training, resources, and tools.
🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc
Jarida (Jadx + Frida) is a Jadx GUI plugin that lets you trace and optionally patch Java method return values at runtime using Frida, directly from Jadx’s decompiled view.
Moonwalk++: Simple POC Combining StackMoonwalking and Memory Encryption
Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator
Binary Ninja plugin to identify obfuscated code and other interesting code constructs
Dynamic unpacker and import fixer for Themida/WinLicense 2.x and 3.x.
O-MVLL is a code obfuscation tool based on LLVM for native code (Android and iOS).
A Qt-based CyberChef interface designed for malware analysis workflows, particularly in IDA Pro
Multi-architecture emulation for the modern era.
Explain complex systems using visuals and simple terms. Help you prepare for system design interviews.
Unbearably fast near-real-time pure-Python runtime-static type-checker.
Rust Library Recognition Project for Rust Malware by the MSTIC-MIRAGE Team
Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)