disassembly-examples
disassembly examples
tools
-
https://github.com/glmcdona/Process-Dump Process Dump
-
https://github.com/glmcdona/strings2 strings2: An improved strings extraction tool
-
https://github.com/lallousx86/AsmInVs 在 vs 中写 asm 代码
-
https://github.com/lallousx86/WEPExplorer Windows Events Providers Explorer
-
https://github.com/lallousx86/Libraries Native utility and wrapper libraries by Elias Bachaalany
-
https://github.com/glmcdona/meddle Framework for vulnerability fuzzing and reverse-engineering tool development
-
https://github.com/glmcdona/MALM MALM: Malware Monitor
-
https://github.com/glmcdona/FunctionHacker Tool for recording, filtering, and hacking function calls within applications or games. Useful for game hacking or malware analysis.
-
https://github.com/programa-stic/barf-project BARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
-
https://github.com/XiphosResearch/exploits Miscellaneous exploit code
-
https://github.com/Comsecuris/shannonRE Helpful scripts for various tasks performed during reverse engineering the Shannon Baseband with the goal to exploit the Samsung Galaxy S6
-
https://github.com/godaddy/procfilter A YARA-integrated process denial framework for Windows
-
https://github.com/DarthTon/Xenos Windows dll injector
-
https://github.com/LongSoft/CrScreenshotDxe UEFI DXE driver to take screenshots from GOP-compatible graphic consoles
-
https://github.com/hashcat/hashcat World's fastest and most advanced password recovery utility
-
https://github.com/blole/injectory command-line interface dll injector
-
https://github.com/codereversing/hekate Winsock inspection/filtering/modifying
-
https://github.com/BreakingMalware/PowerLoaderEx PowerLoaderEx - Advanced Code Injection Technique for x32 / x64
-
https://github.com/fancycode/MemoryModule Library to load a DLL from memory.
-
https://github.com/wisk/medusa An open source interactive disassembler
-
https://github.com/herumi/xbyak a JIT assembler for x86(IA-32)/x64(AMD64, x86-64) MMX/SSE/SSE2/SSE3/SSSE3/SSE4/FPU/AVX/AVX2/AVX-512 by C++ header
-
https://github.com/shmuelyr/CaptainHook CaptainHook is x86/x64 hook environment
-
https://github.com/tandasat/win32_debugout/tree/master/win32_debugout