Stars
Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
IDApython Scripts for Analyzing Golang Binaries
The production-scale datacenter profiler (C/C++, Go, Rust, Python, Java, NodeJS, .NET, PHP, Ruby, Perl, ...)
Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode
A community driven collection of IDA FLIRT signature files
This repo contains samples that demonstrate the API used in Windows classic desktop applications.
Information about Linux system calls on different architectures
A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...
BC-SECURITY / Empire
Forked from EmpireProject/EmpireEmpire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Cuckoo3 is a Python 3 open source automated malware analysis system.
windows syscall table from xp ~ 10 rs4
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Examples of the inner workings of the WinCrypto API
A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster visually similar images together. The script computes the Avera…
Universal Extractor 2 is a tool to extract files from any type of archive or installer.
Program for determining types of files for Windows, Linux and MacOS.
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF