Stars
Jupyter Notebooks for the Blue Team
The FLARE team's open-source tool to identify capabilities in executable files.
Free and Open Source Reverse Engineering Platform powered by rizin
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
UNIX-like reverse engineering framework and command-line toolset
Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, T…
Repo to store compiled modules or links to 3rd party add-on modules.
This repository serves as a place for community created Targets and Modules for use with KAPE.
Fetch information about a public Google document.
OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits.
This is a place for all things OSINT & Bookmarklets!
Clone a voice in 5 seconds to generate arbitrary speech in real-time
Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these s…
The blue-merle package enhances anonymity and reduces forensic traceability of the GL-E750 Mudi 4G mobile wi-fi router
Command-line program to download videos from YouTube.com and other video sites
Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.
Sample images for testing Exif metadata retrieval.
List of Github repositories and articles with list of dorks for different search engines
A collection of several hundred online tools for OSINT
Incredibly fast crawler designed for OSINT.
🔎 Find origin servers of websites behind CloudFlare by using Internet-wide scan data from Censys.
Abusing Certificate Transparency logs for getting HTTPS websites subdomains.