Minh-Triet Pham Tran's repositories
SQL-Injection-Payloads
SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...
Watch-Your-Hack-Vietnamese-translation
Bản dịch tài liệu bảo mật Watch Your Hack, bảo vệ cá nhân trước hacker https://watchyourhack.com/
Crackme-collections
Crackme collections
EFF-Surveillance-Self-Defense-Vietnamese-translation
Bản dịch tài liệu bảo mật Surveillance Self-Defense của Electronic Frontier Foundation (EFF) https://ssd.eff.org/en
reverse-engineering-and-malware-analysis
Course content and slides from my ancient training on Reverse Engineering & Malware Analysis
API-Tracker
API Tracker by Cysinfo Team
RE-for-beginners
"Reverse Engineering for Beginners" free book
Ablation
Ablation is a tool for augmenting static analysis by extracting information at runtime, and importing it into IDA. It can resolve virtual calls, reveal interesting code, exclude heavily traversed regions, identify untested or undocumented features, visually diff samples, or perform root cause analysis simply by running samples. My favourite however is the virtual call resolution with fully interactive x-refs. It's simple, elegant, and disassembled C++ reads like C! It helps me time and time again.
Gautama-Buddha-Quotes
Gautama Buddha Quotes (Quote Collections)
MazeWalker
Toolkit for enriching and speeding up static malware analysis
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
windows-binary-tools
Various tools besides Msys2 that I've found useful to have available on windows. Create an issue if you have anything you want to add, want some binaries updated, or you think that some of them should be moved or re-moved.
write-ups-2014
Wiki-like CTF write-ups repository, maintained by the community. 2014
de4dot
.NET deobfuscator and unpacker.
flare-fakenet-ng
FakeNet-NG - Next Generation Dynamic Network Analysis Tool
HexRaysPyTools
Ida Pro plugin
lighthouse
Code Coverage Explorer for IDA Pro
MegaDumper
Dump native and .NET assemblies
memfuzzing
Memory fuzzing based on sinn3r's In Memory Fuzzer
MyPinTools
Tools to run with Intel PIN
nao
Simple No-meaning Assembly Omitter for IDA Pro (CURRENTLY UNDER DEVELOPMENT)
r2angrdbg
Use angr inside the radare2 debugger. Create an angr state from the current debugger state.
radare2
unix-like reverse engineering framework and commandline tools
rules
Repository of yara rules
Sulo
Dynamic instrumentation tool for Adobe Flash Player built on Intel Pin