GitHub Trends
10.1K subscribers
15.3K links
See what the GitHub community is most excited about today.

A bot automatically fetches new repositories from https://github.com/trending and sends them to the channel.

Author and maintainer: https://github.com/katursis
Download Telegram
#java #disassembler #reverse_engineering #software_analysis

Ghidra is a powerful tool for analyzing software code, created by the National Security Agency. It helps users understand and analyze compiled code on various platforms like Windows, macOS, and Linux. With features like disassembly, decompilation, and scripting, Ghidra is useful for identifying vulnerabilities in software. You can customize it with your own scripts and extensions using Java or Python. This tool is beneficial because it provides deep insights into malicious code, helping protect networks and systems from cyber threats. However, be aware of potential security vulnerabilities in certain versions and follow the installation guides carefully.

https://github.com/NationalSecurityAgency/ghidra
#python #chatbot #chatbots #chatgpt #chatgpt_4 #chatgpt_api #chatgpt_free #chatgpt4 #free_gpt #gpt #gpt_3 #gpt_4 #gpt3 #gpt4 #gpt4_api #language_model #openai #openai_api #openai_chatgpt #python #reverse_engineering

The `gpt4free` project is a tool that allows you to use various AI models like GPT-3.5 and DALL-E 3 without paying for expensive APIs. Here’s how it helps you It supports multiple AI providers, including OpenAI, Bing, and others, allowing you to choose the best option for your needs.
- **Easy Installation** It includes a web UI that you can access locally, making it easy to interact with the AI models.
- **Customization** The project is open-source and actively maintained by a community of contributors, ensuring continuous improvements and new features.

Overall, `gpt4free` provides a flexible and cost-effective way to leverage advanced AI capabilities.

https://github.com/xtekky/gpt4free
#other #android #awesome #bug_bounty #fuzzing #hacking #penetration_testing #pentesting_windows #reverse_engineering #security

This collection of resources is designed for hackers, pentesters, and security researchers. It includes a wide range of lists and repositories covering various aspects of security such as Android security, application security, bug bounty programs, exploit development, and more. These resources provide tools, tutorials, and references to help you improve your skills in cybersecurity. By using these resources, you can gain access to valuable information and tools that will enhance your knowledge and capabilities in the field of cybersecurity, making you better equipped to handle security assessments, incident responses, and other related tasks.

https://github.com/Hack-with-Github/Awesome-Hacking
#cplusplus #analyzer #binary_analysis #c_plus_plus #cpp #cybersecurity #dark_mode #dear_imgui #disassembler #forensics #hacking #hacktoberfest #hex_editor #ips #mathematical_evaluator #multi_platform #pattern_language #preprocessor #reverse_engineering #static_analysis #windows

ImHex is a powerful hex editor designed for reverse engineers, programmers, and anyone who needs to work with binary data. It offers many features that make it useful and user-friendly. Here are the key benefits ImHex allows you to edit bytes, manage patches, undo and redo changes infinitely, and copy bytes in various formats. It also supports colorful highlighting, data display in different types (like integers, floats, colors), and decoding data in various encodings.
- **Custom Pattern Language** It has dark and light modes to protect your eyes, especially during late-night work sessions.
- **Data Analysis and Visualization** It supports various search methods (string, sequence, regex) and numerous hashing algorithms.
- **Modern Interface** ImHex works on Windows, macOS, and Linux, with options for web and nightly pre-release versions.

Overall, ImHex provides a comprehensive set of tools to make working with binary data efficient and comfortable.

https://github.com/WerWolv/ImHex
#html #mitmproxy #openapi #reverse_engineering #swagger

This tool, called `mitmproxy2swagger`, helps you automatically create API documentation from the traffic your apps generate. Here’s how it benefits you:

You can capture the HTTP traffic of your apps using `mitmproxy` or browser DevTools, and then convert this traffic into OpenAPI 3.0 specifications. This process is automated, so you don't need to manually write the API documentation. You can run the tool multiple times with different captures, and it will merge the data safely. The tool also allows you to add example data and headers to the requests and responses, making your API documentation more comprehensive. This saves time and effort in documenting your APIs accurately.

https://github.com/alufers/mitmproxy2swagger