ts1lv3r's Stars
mandiant/flare-fakenet-ng
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
gatariee/gocheck
Because AV evasion should be easy.
hasherezade/hollows_hunter
Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches).
google/syzkaller
syzkaller is an unsupervised coverage-guided kernel fuzzer
TakahiroHaruyama/VDR
Vulnerable driver research tool, result and exploit PoCs
CycodeLabs/raven
CI/CD Security Analyzer
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
Yamato-Security/hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
al3xtjames/ghidra-firmware-utils
Ghidra utilities for analyzing PC firmware
binarly-io/efiXplorer
IDA plugin and loader for UEFI firmware analysis and reverse engineering automation
ocsf/ocsf-schema
OCSF Schema
mandiant/Ghidrathon
The FLARE team's open-source extension to add Python 3 scripting to Ghidra.
neovim/neovim
Vim-fork focused on extensibility and usability
mandiant/flare-floss
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
LJP-TW/JITHook
HyperDbg/HyperDbg
State-of-the-art native debugging tools
microsoft/windows-rs
Rust for Windows
mandiant/flare-vm
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
beeware/briefcase
Tools to support converting a Python project into a standalone native application.
LetsDefend/SOC-Interview-Questions
SOC Interview Questions
microsoft/windows-drivers-rs
Platform that enables Windows driver development in Rust. Developed by Surface.