#python #apple #machine_learning #neuralhash #reverse_engineering
https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX
https://github.com/AsuharietYgvar/AppleNeuralHash2ONNX
GitHub
GitHub - AsuharietYgvar/AppleNeuralHash2ONNX: Convert Apple NeuralHash model for CSAM Detection to ONNX.
Convert Apple NeuralHash model for CSAM Detection to ONNX. - AsuharietYgvar/AppleNeuralHash2ONNX
#c_lang #binary_analysis #c #commandline #disassembler #forensics #hacktoberfest #malware_analysis #radare2 #reverse_engineering #security
https://github.com/radareorg/radare2
https://github.com/radareorg/radare2
GitHub
GitHub - radareorg/radare2: UNIX-like reverse engineering framework and command-line toolset
UNIX-like reverse engineering framework and command-line toolset - radareorg/radare2
#c_lang #assembler #assembly #blue_team #cplusplus #cpp #cyber #cyber_threat_intelligence #cybersecurity #hack #hacking #ida #ida_pro #idapro #microsoft_windows #reverse_engineering #training #training_material #training_materials #win32api #windows
https://github.com/mytechnotalent/Hacking-Windows
https://github.com/mytechnotalent/Hacking-Windows
GitHub
GitHub - mytechnotalent/Hacking-Windows: A FREE Windows C development course where we will learn the Win32API and reverse engineer…
A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment. - mytechnotalent/Hacking-Windows
#java #abstract_interpretation #binary_analysis #ghidra #reverse_engineering #security #static_analyzer #vulnerability_scanner
https://github.com/KeenSecurityLab/BinAbsInspector
https://github.com/KeenSecurityLab/BinAbsInspector
GitHub
GitHub - KeenSecurityLab/BinAbsInspector: BinAbsInspector: Vulnerability Scanner for Binaries
BinAbsInspector: Vulnerability Scanner for Binaries - KeenSecurityLab/BinAbsInspector
#common_lisp #jak #jak_and_daxter #lisp #ps2 #reverse_engineering #scheme
https://github.com/open-goal/jak-project
https://github.com/open-goal/jak-project
GitHub
GitHub - open-goal/jak-project: Reviving the language that brought us the Jak & Daxter Series
Reviving the language that brought us the Jak & Daxter Series - open-goal/jak-project
#html #gnuradio #protocols #reverse_engineering #rf #sdr #signals #tools
https://github.com/ainfosec/FISSURE
https://github.com/ainfosec/FISSURE
GitHub
GitHub - ainfosec/FISSURE: The RF and reverse engineering framework for everyone. Follow and ★ to show your support!
The RF and reverse engineering framework for everyone. Follow and ★ to show your support! - ainfosec/FISSURE
#c_lang #binary_exploitation #cheatsheet #crypto #cryptography #cryptohack #ctf #ctf_challenges #ctf_tools #ctf_writeups #cybersecurity #hackthebox #learning #pentesting #pwn #resources #reverse_engineering #reversing #ssti #steganography #tryhackme
https://github.com/Adamkadaban/CTFs
https://github.com/Adamkadaban/CTFs
GitHub
GitHub - Adamkadaban/CTFs: CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done - Adamkadaban/CTFs
#python #binary_ninja #capture_the_flag #ctf #debugging #disassembler #gdb #gdbinit #gef #hack #hacktoberfest #hacktoberfest2022 #ida_pro #linux #malware_analysis #peda #pwnable #pwndbg #reverse_engineering
https://github.com/pwndbg/pwndbg
https://github.com/pwndbg/pwndbg
GitHub
GitHub - pwndbg/pwndbg: Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy - pwndbg/pwndbg
#csharp #decompiler #games #reverse_engineering #unity #unity3d
https://github.com/AssetRipper/AssetRipper
https://github.com/AssetRipper/AssetRipper
GitHub
GitHub - AssetRipper/AssetRipper: GUI Application to work with engine assets, asset bundles, and serialized files
GUI Application to work with engine assets, asset bundles, and serialized files - AssetRipper/AssetRipper
#java #disassembler #reverse_engineering #software_analysis
Ghidra is a powerful tool for analyzing software code, created by the National Security Agency. It helps users understand and analyze compiled code on various platforms like Windows, macOS, and Linux. With features like disassembly, decompilation, and scripting, Ghidra is useful for identifying vulnerabilities in software. You can customize it with your own scripts and extensions using Java or Python. This tool is beneficial because it provides deep insights into malicious code, helping protect networks and systems from cyber threats. However, be aware of potential security vulnerabilities in certain versions and follow the installation guides carefully.
https://github.com/NationalSecurityAgency/ghidra
Ghidra is a powerful tool for analyzing software code, created by the National Security Agency. It helps users understand and analyze compiled code on various platforms like Windows, macOS, and Linux. With features like disassembly, decompilation, and scripting, Ghidra is useful for identifying vulnerabilities in software. You can customize it with your own scripts and extensions using Java or Python. This tool is beneficial because it provides deep insights into malicious code, helping protect networks and systems from cyber threats. However, be aware of potential security vulnerabilities in certain versions and follow the installation guides carefully.
https://github.com/NationalSecurityAgency/ghidra
GitHub
GitHub - NationalSecurityAgency/ghidra: Ghidra is a software reverse engineering (SRE) framework
Ghidra is a software reverse engineering (SRE) framework - NationalSecurityAgency/ghidra
#python #chatbot #chatbots #chatgpt #chatgpt_4 #chatgpt_api #chatgpt_free #chatgpt4 #free_gpt #gpt #gpt_3 #gpt_4 #gpt3 #gpt4 #gpt4_api #language_model #openai #openai_api #openai_chatgpt #python #reverse_engineering
The `gpt4free` project is a tool that allows you to use various AI models like GPT-3.5 and DALL-E 3 without paying for expensive APIs. Here’s how it helps you It supports multiple AI providers, including OpenAI, Bing, and others, allowing you to choose the best option for your needs.
- **Easy Installation** It includes a web UI that you can access locally, making it easy to interact with the AI models.
- **Customization** The project is open-source and actively maintained by a community of contributors, ensuring continuous improvements and new features.
Overall, `gpt4free` provides a flexible and cost-effective way to leverage advanced AI capabilities.
https://github.com/xtekky/gpt4free
The `gpt4free` project is a tool that allows you to use various AI models like GPT-3.5 and DALL-E 3 without paying for expensive APIs. Here’s how it helps you It supports multiple AI providers, including OpenAI, Bing, and others, allowing you to choose the best option for your needs.
- **Easy Installation** It includes a web UI that you can access locally, making it easy to interact with the AI models.
- **Customization** The project is open-source and actively maintained by a community of contributors, ensuring continuous improvements and new features.
Overall, `gpt4free` provides a flexible and cost-effective way to leverage advanced AI capabilities.
https://github.com/xtekky/gpt4free
GitHub
GitHub - xtekky/gpt4free: The official gpt4free repository | various collection of powerful language models | o4, o3 and deepseek…
The official gpt4free repository | various collection of powerful language models | o4, o3 and deepseek r1, gpt-4.1, gemini 2.5 - xtekky/gpt4free
#other #android #awesome #bug_bounty #fuzzing #hacking #penetration_testing #pentesting_windows #reverse_engineering #security
This collection of resources is designed for hackers, pentesters, and security researchers. It includes a wide range of lists and repositories covering various aspects of security such as Android security, application security, bug bounty programs, exploit development, and more. These resources provide tools, tutorials, and references to help you improve your skills in cybersecurity. By using these resources, you can gain access to valuable information and tools that will enhance your knowledge and capabilities in the field of cybersecurity, making you better equipped to handle security assessments, incident responses, and other related tasks.
https://github.com/Hack-with-Github/Awesome-Hacking
This collection of resources is designed for hackers, pentesters, and security researchers. It includes a wide range of lists and repositories covering various aspects of security such as Android security, application security, bug bounty programs, exploit development, and more. These resources provide tools, tutorials, and references to help you improve your skills in cybersecurity. By using these resources, you can gain access to valuable information and tools that will enhance your knowledge and capabilities in the field of cybersecurity, making you better equipped to handle security assessments, incident responses, and other related tasks.
https://github.com/Hack-with-Github/Awesome-Hacking
GitHub
GitHub - Hack-with-Github/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers
A collection of various awesome lists for hackers, pentesters and security researchers - Hack-with-Github/Awesome-Hacking
#cplusplus #analyzer #binary_analysis #c_plus_plus #cpp #cybersecurity #dark_mode #dear_imgui #disassembler #forensics #hacking #hacktoberfest #hex_editor #ips #mathematical_evaluator #multi_platform #pattern_language #preprocessor #reverse_engineering #static_analysis #windows
ImHex is a powerful hex editor designed for reverse engineers, programmers, and anyone who needs to work with binary data. It offers many features that make it useful and user-friendly. Here are the key benefits ImHex allows you to edit bytes, manage patches, undo and redo changes infinitely, and copy bytes in various formats. It also supports colorful highlighting, data display in different types (like integers, floats, colors), and decoding data in various encodings.
- **Custom Pattern Language** It has dark and light modes to protect your eyes, especially during late-night work sessions.
- **Data Analysis and Visualization** It supports various search methods (string, sequence, regex) and numerous hashing algorithms.
- **Modern Interface** ImHex works on Windows, macOS, and Linux, with options for web and nightly pre-release versions.
Overall, ImHex provides a comprehensive set of tools to make working with binary data efficient and comfortable.
https://github.com/WerWolv/ImHex
ImHex is a powerful hex editor designed for reverse engineers, programmers, and anyone who needs to work with binary data. It offers many features that make it useful and user-friendly. Here are the key benefits ImHex allows you to edit bytes, manage patches, undo and redo changes infinitely, and copy bytes in various formats. It also supports colorful highlighting, data display in different types (like integers, floats, colors), and decoding data in various encodings.
- **Custom Pattern Language** It has dark and light modes to protect your eyes, especially during late-night work sessions.
- **Data Analysis and Visualization** It supports various search methods (string, sequence, regex) and numerous hashing algorithms.
- **Modern Interface** ImHex works on Windows, macOS, and Linux, with options for web and nightly pre-release versions.
Overall, ImHex provides a comprehensive set of tools to make working with binary data efficient and comfortable.
https://github.com/WerWolv/ImHex
GitHub
GitHub - WerWolv/ImHex: 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3…
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM. - WerWolv/ImHex
#html #mitmproxy #openapi #reverse_engineering #swagger
This tool, called `mitmproxy2swagger`, helps you automatically create API documentation from the traffic your apps generate. Here’s how it benefits you:
You can capture the HTTP traffic of your apps using `mitmproxy` or browser DevTools, and then convert this traffic into OpenAPI 3.0 specifications. This process is automated, so you don't need to manually write the API documentation. You can run the tool multiple times with different captures, and it will merge the data safely. The tool also allows you to add example data and headers to the requests and responses, making your API documentation more comprehensive. This saves time and effort in documenting your APIs accurately.
https://github.com/alufers/mitmproxy2swagger
This tool, called `mitmproxy2swagger`, helps you automatically create API documentation from the traffic your apps generate. Here’s how it benefits you:
You can capture the HTTP traffic of your apps using `mitmproxy` or browser DevTools, and then convert this traffic into OpenAPI 3.0 specifications. This process is automated, so you don't need to manually write the API documentation. You can run the tool multiple times with different captures, and it will merge the data safely. The tool also allows you to add example data and headers to the requests and responses, making your API documentation more comprehensive. This saves time and effort in documenting your APIs accurately.
https://github.com/alufers/mitmproxy2swagger
GitHub
GitHub - alufers/mitmproxy2swagger: Automagically reverse-engineer REST APIs via capturing traffic
Automagically reverse-engineer REST APIs via capturing traffic - alufers/mitmproxy2swagger