alufers/mitmproxy2swagger
Automagically reverse-engineer REST APIs via capturing traffic
Language: HTML
#mitmproxy #openapi #reverse_engineering #swagger
Stars: 1468 Issues: 0 Forks: 41
https://github.com/alufers/mitmproxy2swagger
Automagically reverse-engineer REST APIs via capturing traffic
Language: HTML
#mitmproxy #openapi #reverse_engineering #swagger
Stars: 1468 Issues: 0 Forks: 41
https://github.com/alufers/mitmproxy2swagger
GitHub
GitHub - alufers/mitmproxy2swagger: Automagically reverse-engineer REST APIs via capturing traffic
Automagically reverse-engineer REST APIs via capturing traffic - alufers/mitmproxy2swagger
Barracudach/CallStack-Spoofer
This tool will allow you to spoof the return addresses of your functions as well as system functions.
Language: C++
#callstack #cpp #game_hacking #reverse_engineering #shellcode #spoofer #windows
Stars: 116 Issues: 0 Forks: 25
https://github.com/Barracudach/CallStack-Spoofer
This tool will allow you to spoof the return addresses of your functions as well as system functions.
Language: C++
#callstack #cpp #game_hacking #reverse_engineering #shellcode #spoofer #windows
Stars: 116 Issues: 0 Forks: 25
https://github.com/Barracudach/CallStack-Spoofer
GitHub
GitHub - Barracudach/CallStack-Spoofer: This tool will allow you to spoof the return addresses of your functions as well as systemβ¦
This tool will allow you to spoof the return addresses of your functions as well as system functions. - Barracudach/CallStack-Spoofer
redballoonsecurity/ofrak
OFRAK: unpack, modify, and repack binaries.
Language: Python
#ctf #firmware #firmware_tools #repacking #reverse_engineering #unpacker
Stars: 129 Issues: 1 Forks: 9
https://github.com/redballoonsecurity/ofrak
OFRAK: unpack, modify, and repack binaries.
Language: Python
#ctf #firmware #firmware_tools #repacking #reverse_engineering #unpacker
Stars: 129 Issues: 1 Forks: 9
https://github.com/redballoonsecurity/ofrak
GitHub
GitHub - redballoonsecurity/ofrak: OFRAK: unpack, modify, and repack binaries.
OFRAK: unpack, modify, and repack binaries. Contribute to redballoonsecurity/ofrak development by creating an account on GitHub.
JusticeRage/Gepetto
IDA plugin which queries OpenAI's davinci-003 language model to speed up reverse-engineering
Language: Python
#gpt_3 #ida_pro #reverse_engineering
Stars: 836 Issues: 3 Forks: 67
https://github.com/JusticeRage/Gepetto
IDA plugin which queries OpenAI's davinci-003 language model to speed up reverse-engineering
Language: Python
#gpt_3 #ida_pro #reverse_engineering
Stars: 836 Issues: 3 Forks: 67
https://github.com/JusticeRage/Gepetto
GitHub
GitHub - JusticeRage/Gepetto: IDA plugin which queries language models to speed up reverse-engineering
IDA plugin which queries language models to speed up reverse-engineering - JusticeRage/Gepetto
acheong08/EdgeGPT
Reverse engineered API of Microsoft's Bing Chat
Language: Python
#binggpt #chatgpt #edge #edgegpt #gpt #reverse_engineering
Stars: 717 Issues: 14 Forks: 67
https://github.com/acheong08/EdgeGPT
Reverse engineered API of Microsoft's Bing Chat
Language: Python
#binggpt #chatgpt #edge #edgegpt #gpt #reverse_engineering
Stars: 717 Issues: 14 Forks: 67
https://github.com/acheong08/EdgeGPT
GitHub
GitHub - acheong08/EdgeGPT: Reverse engineered API of Microsoft's Bing Chat AI
Reverse engineered API of Microsoft's Bing Chat AI - acheong08/EdgeGPT
google/bindiff
Quickly find differences and similarities in disassembled code
Language: Java
#bindiff #binexport #diffing #program_analysis #program_differencing #reverse_engineering
Stars: 535 Issues: 18 Forks: 26
https://github.com/google/bindiff
Quickly find differences and similarities in disassembled code
Language: Java
#bindiff #binexport #diffing #program_analysis #program_differencing #reverse_engineering
Stars: 535 Issues: 18 Forks: 26
https://github.com/google/bindiff
GitHub
GitHub - google/bindiff: Quickly find differences and similarities in disassembled code
Quickly find differences and similarities in disassembled code - google/bindiff
actuator/Android-Security-Exploits-YouTube-Curriculum
πA curated list of modern Android exploitation conference talks.
#android #blackhat #defcon #exploit #hacking #nullcon #reverse_engineering #security #shmoocon #strange_loop_conference #troopers24
Stars: 229 Issues: 0 Forks: 18
https://github.com/actuator/Android-Security-Exploits-YouTube-Curriculum
πA curated list of modern Android exploitation conference talks.
#android #blackhat #defcon #exploit #hacking #nullcon #reverse_engineering #security #shmoocon #strange_loop_conference #troopers24
Stars: 229 Issues: 0 Forks: 18
https://github.com/actuator/Android-Security-Exploits-YouTube-Curriculum
GitHub
GitHub - actuator/Android-Security-Exploits-YouTube-Curriculum: πA curated list of modern Android exploitation conference talks.
πA curated list of modern Android exploitation conference talks. - actuator/Android-Security-Exploits-YouTube-Curriculum
es3n1n/obfuscator
PE bin2bin obfuscator
Language: C++
#bin2bin #cpp #cpp23 #obfuscation #obfuscator #reverse_engineering #windows
Stars: 190 Issues: 3 Forks: 17
https://github.com/es3n1n/obfuscator
PE bin2bin obfuscator
Language: C++
#bin2bin #cpp #cpp23 #obfuscation #obfuscator #reverse_engineering #windows
Stars: 190 Issues: 3 Forks: 17
https://github.com/es3n1n/obfuscator
GitHub
GitHub - es3n1n/obfuscator: PE bin2bin obfuscator
PE bin2bin obfuscator. Contribute to es3n1n/obfuscator development by creating an account on GitHub.
mrexodia/ida-pro-mcp
MCP Server for IDA Pro
Language: Python
#cline #cursor #ida_plugin #ida_pro #mcp #mcp_server #modelcontextprotocol #reverse_engineering
Stars: 194 Issues: 2 Forks: 9
https://github.com/mrexodia/ida-pro-mcp
MCP Server for IDA Pro
Language: Python
#cline #cursor #ida_plugin #ida_pro #mcp #mcp_server #modelcontextprotocol #reverse_engineering
Stars: 194 Issues: 2 Forks: 9
https://github.com/mrexodia/ida-pro-mcp
GitHub
GitHub - mrexodia/ida-pro-mcp: MCP Server for IDA Pro.
MCP Server for IDA Pro. Contribute to mrexodia/ida-pro-mcp development by creating an account on GitHub.
DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Language: C#
#cpp #cs #cybersecurity #dotnet #hacktoberfest #infosec #low_level #malware_analysis #mutator #native #obfuscation #obfuscator #pe #pentest #reverse_engineering #static_analysis
Stars: 177 Issues: 0 Forks: 13
https://github.com/DosX-dev/Astral-PE
GitHub
GitHub - DosX-dev/Astral-PE: Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64)
Astral-PE is a low-level mutator (Headers/EP obfuscator) for native Windows PE files (x32/x64) - DosX-dev/Astral-PE