Pinned Repositories
abaddon
arch-armv7
ARMv7 architecture plugin
embrace_decryptor
Decryption tool for the "Embrace", "PainLocker" and "Everbe" ransomwares files (with extensions .[embrace@airmail.cc].embrace, .[pain@cock.lu].pain and .[everbe@airmail.cc].everbe)
impacket
Impacket is a collection of Python classes for working with network protocols.
map-editor
Map editor for the Gen 1 and Gen 2 Pokémon games
pokeyellow
Disassembly of Pokemon Yellow
pypykatz
Mimikatz implementation in pure Python
sslscantocsv
Parses sslscan XML output. Outputs a compacted CSV. Nothing else.
themaks's Repositories
themaks/embrace_decryptor
Decryption tool for the "Embrace", "PainLocker" and "Everbe" ransomwares files (with extensions .[embrace@airmail.cc].embrace, .[pain@cock.lu].pain and .[everbe@airmail.cc].everbe)
themaks/sslscantocsv
Parses sslscan XML output. Outputs a compacted CSV. Nothing else.
themaks/arch-armv7
ARMv7 architecture plugin
themaks/impacket
Impacket is a collection of Python classes for working with network protocols.
themaks/map-editor
Map editor for the Gen 1 and Gen 2 Pokémon games
themaks/pokeyellow
Disassembly of Pokemon Yellow
themaks/pypykatz
Mimikatz implementation in pure Python
themaks/abaddon
themaks/angr
The next-generation binary analysis platform from UC Santa Barbara's Seclab!
themaks/dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
themaks/flipperzero-goodies
Some usefull data for flipper zero [intercom keys][scripts]
themaks/binsync
A reversing plugin for cross-decompiler collaboration, built on git.
themaks/libbs
A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!
themaks/LiME
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures from Android devices. It also minimizes its interaction between user and kernel space processes during acquisition, which allows it to produce memory captures that are more forensically sound than those of other tools designed for Linux memory acquisition.
themaks/lsassy
Extract credentials from lsass remotely
themaks/pdb
A parser for Microsoft PDB (Program Database) debugging information
themaks/s7-get
Tools to interact with Siemens PLCs
themaks/simuvex
A symbolic execution engine for the VEX IR