dkemp's Stars
WerWolv/ImHex
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
peass-ng/PEASS-ng
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
alufers/mitmproxy2swagger
Automagically reverse-engineer REST APIs via capturing traffic
ticarpi/jwt_tool
:snake: A toolkit for testing, tweaking and cracking JSON Web Tokens
HyperDbg/HyperDbg
State-of-the-art native debugging tools
panda-re/panda
Platform for Architecture-Neutral Dynamic Analysis
mandiant/flare-ida
IDA Pro utilities from FLARE team
rabbitstack/fibratus
Adversary tradecraft detection, protection, and hunting
uxmal/reko
Reko is a binary decompiler.
504ensicsLabs/LiME
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures from Android devices. It also minimizes its interaction between user and kernel space processes during acquisition, which allows it to produce memory captures that are more forensically sound than those of other tools designed for Linux memory acquisition.
jstrosch/malware-samples
Malware samples, analysis exercises and other interesting resources.
P1sec/QCSuper
QCSuper is a tool communicating with Qualcomm-based phones and modems, allowing to capture raw 2G/3G/4G radio frames, among other things.
vivisect/vivisect
intel/kernel-fuzzer-for-xen-project
Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL
nautilus-fuzz/nautilus
A grammar based feedback Fuzzer
revng/revng-c
RCayre/mirage
Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.
clem9669/wordlists
Various wordlists FR & EN - Cracking French passwords
xyzz/amonet
A bootrom exploit for MediaTek devices
fgsect/BaseSAFE
Emulation and Feedback Fuzzing of Firmware with Memory Sanitization
Imtiazkarimik23/ATFuzzer
"Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019
quarkslab/samsung-trustzone-research
Reverse-engineering tools and exploits for Samsung's implementation of TrustZone
seal9055/sfuzz
High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques
andresriancho/mongo-objectid-predict
Predict Mongo ObjectIds
google/binja-hexagon
Accenture/FirmLoader
PortSwigger/nope-proxy
Non-HTTP Protocol Extension (NoPE) Proxy and DNS for Burp Suite.
mhei/mmc-utils
Copy of https://git.kernel.org/pub/scm/utils/mmc/mmc-utils.git/
arturkow2000/lgk10exploit
tsundokul/pyradamsa
Python bindings for calling radamsa mutators