Maciej Miszczyk's starred repositories
perf-tools
Performance analysis tools based on Linux perf_events (aka perf) and ftrace
UnityExplorer
An in-game UI for exploring, debugging and modifying IL2CPP and Mono Unity games.
BandcampDownloader
A Windows app used to download albums from Bandcamp.
Android-Security-Reference
A W.I.P Android Security Ref
APKHunt
APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code.
FuckThatPacker
A simple python packer to easily bypass Windows Defender
html5bytebeat
Bytebeats in HTML5
threader3000
Multi-threaded Python Port Scanner with Nmap Integration
How-To-Tamper-With-Any-Electron-Application
This work-in-progress outlines known vulnerabilities in the Electron framework, and how they may be abused to create dangerous exploits.
turing-machine
A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
ghidra-jni
jni.h compiled for Ghidra
libfiowrapper
Library to wrap all file calls when fuzzing with AFL++
CAS
Code Aware Services (CAS) is a set of tools for extracting information from a (especially large) source code trees. It consists of Build Awareness Service (BAS) and Function/Type database (FTDB). BAS is a tool for extracting information how particular S/W image is created from ongoing builds. FTDB transforms predefined source code information (like information about functions and types) into easily accessible format (like JSON) which can be used by a number of applications.
Mother4Decompile
A decompile of Mother 4.
disclosures
A place for disclosing things
KingsFieldRE
King's Field (II) Reverse Engineering Tools and Documentation
auto_off_target
AoT is a system for automatically generating off-target test harness by using build information.