flare-capa
The FLARE team's open-source tool to identify capabilities in executable files.
openhaystack
Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.
rascal
The implementation of the Rascal meta-programming language (including interpreter, type checker, parser generator, compiler and JVM based run-time system)
fa
Automation tool for locating symbols & structs in binary (primary IDA focused)
plants-vs.-zombies-online-battle
🧟 Plants vs. Zombies multiplayer battle, developed via reverse engineering, inline hook and dynamic-link library injection. Two online players defend and attack as the plant and zombie respectively.(通过逆向工程、内联Hook和动态链接库注入实现的《植物大战僵尸》双人网络对战,两名玩家分别使用植物或僵尸进行防守和攻击。)
elf-static-toolkit
ELF Static Toolkit | Executable and Linkable Format (ELF) Analysing Toolkit
pe-static-toolkit
PE Static Toolkit | Portable Executable (PE) Analysing Toolkit
apk-static-toolkit
APK Static Toolkit | Android Package Kit (APK) Analysing Toolkit
https://github.com/crowdstrike/drawmeatree
Tool to visualize the output of the WinDbg "wt" command as customizable graphic trees, to facilitate reverse engineering.
windows-tiny-pe
🗜️ A 208-byte, manually created tiny Windows x86 PE file that can run on Windows XP and pop up a message box.(手动创建的微型Windows x86可执行文件,仅为208字节,可以在Windows XP运行并弹出消息框。)
https://github.com/dbetchkal/public_dataglean_i
A Processing based tool to glean useful numeric results that are 'locked up' in a digital image
https://github.com/csvl/sema
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
https://github.com/byt3n33dl3/gxc-ghidra
Software for Reverse Engineering (SRE) suite of tools Developed by NSA Research Directorate in support of the Cybersecurity processes.
context-engineering
Explore cutting-edge research in context engineering with insights from top institutions. Enhance AI performance with practical techniques. 🌟📂
reverse-engineering-yjmob100k-grid
Revealing urban area from mobile positioning data
https://github.com/czs108/microsoft-malware-classification
🔍 "2015 Microsoft Malware Classification Challenge" - Using machine learning to classify malware into different families based on Windows PE structures, disassembly scripts and machine code.
UnrollingAverages
A Julia package to deconvolve ("unroll") moving averages of time series to get the original ones back.
https://github.com/brianpugh/game-and-watch-patch
CFW for the Nintendo Game and Watch
gview
GView is a cross-platform framework for reverse-engineering. Users can leverage the diverse range of available visualization options to effectively analyze and interpret the information.
super-mario-maker-2-reverse-engineering-documentation
Work-in-progress reverse engineering documentation for Super Mario Maker 2 version 3.0.3.
mastg
The OWASP Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes technical processes for verifying the OWASP Mobile Security Weakness Enumeration (MASWE) weaknesses, which are in alignment with the OWASP MASVS.
lego-batman
A work-in-progress decompilation of LEGO Batman (LEGO® Batman™: The Videogame) version 1.0.1 for Mac OS X. Decompiled with IDA Professional 9.0.
https://github.com/alandtse/skyrim_vr_address_library
Address library for converting Skyrim SSE skse mods to Skyrim VR
windows-pe-packer
🗜️ A packer for Windows x86 executable files written in C and Intel x86 Assembly. The new file after packing can obstruct reverse engineering.(使用C和Intel x86汇编开发的Windows x86可执行文件打包工具,打包后的新文件可以阻碍逆向工程。)
minesweeper-cheat
💣 A game cheat for Microsoft Minesweeper. It will change the window title to "Mlnesweeper" if the current block has a mine.(微软扫雷游戏的作弊工具,如果当前方块有雷,窗口标题会被修改为“Mlnesweeper”。)