Lists (2)
Sort Name ascending (A-Z)
Starred repositories
A collection of Flipper Zero sub files
Evil-M5Project is an innovative tool developed for ethical testing and exploration of WiFi networks. It's compatible with Cardputer, Atoms3, Fire, core2. You can scan, monitor, and interact with Wi…
Tools and Techniques for Blue Team / Incident Response
A Coverage Explorer for Reverse Engineers
BinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Scanning APK file for URIs, endpoints & secrets.
Build your own 'AirTags' 🏷 today! Framework for tracking personal Bluetooth devices via Apple's massive Find My network.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.
Exploit Development and Reverse Engineering with GDB Made Easy
JTAGulator alternative for RP2040 microcontroller based development boards including RPi Pico
Together Mixture-Of-Agents (MoA) – 65.1% on AlpacaEval with OSS models
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for reports
The all-in-one Desktop & Docker AI application with built-in RAG, AI agents, and more.
The ARTful library for dynamically modifying the Android Runtime
A chatbot wrapper for the Android Debug Bridge to assist in Digital Forensics investigations
Databases Diagrams related to the Running applications of the paper "Digital Footprints on the Run: A Forensic Examination of Android Running Workout Applications"
An Open Source Mobile Forensics Investigation Tool for Android Platform
androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces of compromise.
Extract WhatsApp private key from any non-rooted Android device (Android 7+ supported)
androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces of compromise.