Lists (8)
Sort Name ascending (A-Z)
Stars
- All languages
- Assembly
- Astro
- C
- C#
- C++
- CSS
- Clojure
- DIGITAL Command Language
- Dart
- Dockerfile
- Go
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Lua
- MATLAB
- Makefile
- Max
- Meson
- Nim
- OCaml
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Reason
- Ruby
- Rust
- SCSS
- SQL
- SaltStack
- Scala
- Scheme
- Shell
- Solidity
- Swift
- TeX
- TypeScript
- Vue
- WebAssembly
- XSLT
- YARA
An Open Source Machine Learning Framework for Everyone
Build cross-platform desktop apps with JavaScript, HTML, and CSS
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
The C based gRPC (C++, Python, Ruby, Objective-C, PHP, C#)
Carbon Language's main repository: documents, design, implementation, and related tools. (NOTE: Carbon Language is experimental; see README)
Emscripten: An LLVM-to-WebAssembly Compiler
Free and Open Source Reverse Engineering Platform powered by rizin
RetDec is a retargetable machine-code decompiler based on LLVM.
Linux system exploration and troubleshooting tool with first class support for containers
Google SafetyNet attestation workarounds for Magisk
Cinder is a community-developed, free and open source library for professional-quality creative coding in C++.
Fix Play Integrity (and SafetyNet) verdicts.
LIEF - Library to Instrument Executable Formats (C++, Python, Rust)
Tutorials, examples, discussions, research proposals, and other resources related to fuzzing
A date and time library based on the C++11/14/17 <chrono> header
Open-source, cross platform Qt based IDE for reverse-engineering Android application packages.
Necessary material to build and use Zooids to create Swarm User Interfaces
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
A polyhedral compiler for expressing fast and portable data parallel algorithms
Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
A work-in-progress deobfuscator for movfuscated binaries
Open-source symbolic execution framework: https://maat.re