Skip to content
View Souiten's full-sized avatar

Block or report Souiten

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Set of SIGMA rules (>350) mapped to MITRE ATT&CK tactic and techniques

423 79 Updated Nov 8, 2025

AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.

Python 7,385 898 Updated Apr 10, 2026

Obfuscate Go builds

Go 5,381 348 Updated Apr 12, 2026

IDApython Scripts for Analyzing Golang Binaries

Python 667 73 Updated Aug 8, 2024

The production-scale datacenter profiler (C/C++, Go, Rust, Python, Java, NodeJS, .NET, PHP, Ruby, Perl, ...)

Go 3,082 394 Updated Apr 10, 2026

Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode

PowerShell 2,512 501 Updated Nov 15, 2023

IDA FLIRT Signature Database

900 125 Updated Jun 27, 2022

A community driven collection of IDA FLIRT signature files

Max 1,344 185 Updated Sep 3, 2021

This repo contains samples that demonstrate the API used in Windows classic desktop applications.

5,583 3,314 Updated Mar 26, 2026

Information about Linux system calls on different architectures

Python 180 39 Updated Apr 7, 2026

A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...

YARA 141 17 Updated Nov 19, 2023

Malicious traffic detection system

Python 8,373 1,254 Updated Apr 12, 2026

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

PowerShell 5,115 679 Updated Apr 5, 2026

Decrypted content of eqgrp-auction-file.tar.xz

Perl 4,197 2,080 Updated May 24, 2017

Cuckoo3 is a Python 3 open source automated malware analysis system.

Python 808 93 Updated Apr 8, 2026

The one and only one gfwlist here

25,228 4,011 Updated Apr 11, 2026

c2 traffic

196 21 Updated Feb 6, 2023

windows syscall table from xp ~ 10 rs4

Assembly 356 110 Updated Jun 8, 2018

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

PowerShell 2,099 352 Updated Nov 20, 2025

Examples of the inner workings of the WinCrypto API

C++ 15 Updated Jan 2, 2018

Dynamic unpacker based on PE-sieve

C 804 76 Updated Apr 1, 2026

A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster visually similar images together. The script computes the Avera…

Python 23 4 Updated Dec 12, 2021

Universal Extractor 2 is a tool to extract files from any type of archive or installer.

AutoIt 4,274 372 Updated Jul 6, 2024

Dex to Java decompiler

Java 48,045 5,487 Updated Apr 10, 2026

Program for determining types of files for Windows, Linux and MacOS.

JavaScript 10,579 893 Updated Apr 11, 2026

IDA Pro utilities from FLARE team

Python 2,451 474 Updated Oct 29, 2024

A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.

PowerShell 8,537 1,085 Updated Mar 20, 2026

FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.

Python 3,968 526 Updated Apr 9, 2026

Useful PowerShell scripts

PowerShell 1,281 529 Updated Oct 30, 2018

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 76,841 16,838 Updated Apr 8, 2026
Next