Debug
PEiD detects most common packers, cryptors and compilers for PE files.
Sample code demonstrating use cases of the Microsoft.Windows.EventTracing.Processing.All nuget package.
Capture and analyze the high-level performance characteristics of graphics applications on Windows.
Beginner learning materials on how to reverse engineer video games
Tutorials, tools, and more as related to reverse engineering video games.
List of awesome reverse engineering resources
Hack Unity's Mono runtime to emit JIT symbol mapping ETW events
The official Windows Driver Kit documentation sources
The new bridge between Burp Suite and Frida!
⚡ The most powerful PowerShell module for fine-tuning Windows
A curated list of awesome reversing resources
magic-trace collects and displays high-resolution traces of what a process is doing
A collection of my Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Tool suite for inspecting NTFS artifacts.
Digital Forensics artifact repository
Events from all manifest-based and mof-based ETW providers across Windows 10 versions
A lightweight tool to quickly extract valuable information from the Active Directory environment for both attacking and defending.
Loads any C# binary in mem, patching AMSI + ETW.
This is an online course where you can learn and master the skill of low-level performance analysis and tuning.
Radare2 plugin to recover symbols from stripped go executables