There are 2 repositories under opcodes topic.
Droidefense: Advance Android Malware Analysis Framework
旨在交流学习区块链技术,记录智能合约开发应用与相关安全练习的仓库🚀
Database of CPU Opcodes
Example of how to use the CREATE2 opcode released in the Constantinople update for Ethereum
Game Boy CPU (Sharp LR35902) instruction set (opcodes)
A collection of documentation on the CHIP-8 and related
x86-64 | ARM (AArch32/AArch64/THUMB) full instruction set.
Programming Bitcoin Script Transaction (Crypto) Contracts Step-by-Step - Let's start with building your own bitcoin stack machine from zero / scratch and let's run your own bitcoin ops (operations)...
:fire: A really basic emulator to understand how IL code works.
A machine-readable representation of the Intel x86 Instruction Set Reference.
This repo is an approach for the starters in reverse engineering who keeps wondering about everything inside smali.
A parsable list of x86 instructions.
A 32-bit MIPS processor used Altera Quartus II with Verilog.
Ethereum disassembler. Binary bytecode -> Opcodes
Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar
KethoMemoryToolKit is a set of tools used by me to change OPCODES of the memory of any process running in the operating system of specific offsets(RVA) from an ImageBase.
All kinds of random shit. This is everything...for everyone. If you don't like it, please fuck off.
🧭 Powerful and Pythonic framework for reproducible benchmarks of Python code.
An IBM 701 (Defense Calculator) Emulator
Create clr types at runtime without having to emit opcodes. Method bodies can be defined using expressions.