Maxime Meignan's repositories
embrace_decryptor
Decryption tool for the "Embrace", "PainLocker" and "Everbe" ransomwares files (with extensions .[embrace@airmail.cc].embrace, .[pain@cock.lu].pain and .[everbe@airmail.cc].everbe)
sslscantocsv
Parses sslscan XML output. Outputs a compacted CSV. Nothing else.
arch-armv7
ARMv7 architecture plugin
map-editor
Map editor for the Gen 1 and Gen 2 Pokémon games
pokeyellow
Disassembly of Pokemon Yellow
dexcalibur
[Official] Android reverse engineering tool focused on dynamic instrumentation automation. Powered by Frida. It disassembles dex, analyzes it statically, generates hooks, discovers reflected methods, stores intercepted data and does new things from it. Its aim is to be an all-in-one Android reverse engineering platform.
flipperzero-goodies
Some usefull data for flipper zero [intercom keys][scripts]
binsync
A reversing plugin for cross-decompiler collaboration, built on git.
libbs
A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!
LiME
LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices, such as those powered by Android. The tool supports acquiring memory either to the file system of the device or over the network. LiME is unique in that it is the first tool that allows full memory captures from Android devices. It also minimizes its interaction between user and kernel space processes during acquisition, which allows it to produce memory captures that are more forensically sound than those of other tools designed for Linux memory acquisition.
lsassy
Extract credentials from lsass remotely
pdb
A parser for Microsoft PDB (Program Database) debugging information
s7-get
Tools to interact with Siemens PLCs