Highlights
- Pro
Lists (4)
Sort Name ascending (A-Z)
Stars
Rapidly Search and Hunt through Windows Forensic Artefacts
Master programming by recreating your favorite technologies from scratch.
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
A research project to add some brrrrrr to Burp
Flutter Mobile Application Reverse Engineering Tool
nOBEX allows emulating the PBAP, MAP, and HFP profiles to test vehicle infotainment systems and similar devices using these profiles
RAMN (Resistant Automotive Miniature Network), a miniature CAN/CAN-FD testbed of 4 Electronic Control Units.
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Bundletool is a command-line tool to manipulate Android App Bundles
Reverse Engineering: Decompiling Binary Code with Large Language Models
Vanir is a source code-based static analysis tool that automatically identifies the list of missing security patches in the target system. By default, Vanir pulls up-to-date CVEs from Open Source V…
A Google Protocol Buffers (Protobuf) payload decoder/analyzer
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.
The fastest and more comprehensive multiprotocol credentials bruteforcer / password sprayer and enumerator. 🥷
Python implementation of the Open Charge Point Protocol (OCPP).
[deprecated] Yet another frida based iOS dumpdecrypted. Also decrypts app extensions
Download and generate EPUB of your favorite books from O'Reilly Learning (aka Safari Books Online) library.
Apple geolocation services reverse engineering. Database scraper.
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
Simplifying SSL/TLS traffic analysis for researchers by making SSL decryption effortless.