Showing 36 of 58 projects
A software reverse engineering framework for analyzing compiled code across multiple platforms, offering disassembly, decompilation, and scripting.
An open-source binary debugger for Windows optimized for malware analysis and reverse engineering.
A libre, Unix-like reverse engineering framework and command-line toolset for analyzing, debugging, and modifying binaries.
A libre, Unix-like reverse engineering framework and command-line toolset for analyzing, debugging, and modifying binaries.
An automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis, and security assessment framework.
A free and open-source GUI reverse engineering platform powered by rizin, designed for analyzing binaries and executables.
A curated list of awesome malware analysis tools, resources, and related information for security professionals.
A curated list of awesome malware analysis tools, resources, and related information for security professionals.
A live malware repository providing encrypted samples and source code for educational malware analysis and research.
A collection of webshell scripts in various languages for security testing and research purposes.
A cross-platform file type identification tool for malware analysts and reverse engineers, using signature-based and heuristic analysis.
A curated list of awesome honeypot resources, tools, and related components for cybersecurity research and defense.
A curated list of free and open-source honeypot resources, tools, and related components for cybersecurity research.
A curated list of awesome open-source threat intelligence resources, including feeds, tools, platforms, and standards.
A pattern-matching tool for malware researchers to identify and classify malware samples using custom rules.
A comprehensive, curated collection of tools, research, and resources for Android application security analysis and reverse engineering.
A comprehensive, curated collection of tools, research, and resources for Android application security analysis and penetration testing.
A curated list of tools and resources for digital forensics and incident response (DFIR) teams.
A lightweight multi-architecture disassembly framework for binary analysis and reverse engineering.
A collection of software installation scripts for Windows that automates the setup and maintenance of a reverse engineering environment on a virtual machine.
A collection of software installation scripts for Windows that automates the setup and maintenance of a reverse engineering environment on a virtual machine.
A retargetable machine-code decompiler based on LLVM, supporting multiple architectures and file formats.
A retargetable machine-code decompiler based on LLVM, supporting multiple architectures and file formats.
A malicious traffic detection system that monitors network traffic for blacklisted threats and suspicious activities using public feeds and heuristics.
A .NET deobfuscator and unpacker that restores assemblies obfuscated by tools like Dotfuscator, SmartAssembly, and .NET Reactor.
A proof-of-concept malware application that implements common anti-analysis techniques to test security tools and sandbox environments.
An open-source platform for collecting, storing, sharing, and acting upon cybersecurity threat intelligence and indicators.
A Python toolkit for reverse engineering, analyzing, and pentesting Android applications (APK, DEX, resources).
An open-source tool that detects capabilities in executable files like malware, identifying behaviors such as backdoor installation or network communication.
An open-source tool that detects capabilities in executable files like malware, identifying behaviors such as backdoor installation or network communication.
A curated list of awesome information security courses, training resources, and hands-on labs for cybersecurity professionals and students.
A cross-platform library to parse, modify, and abstract executable formats like ELF, PE, and Mach-O.
A Claude Code plugin marketplace providing AI-assisted skills for security research, vulnerability detection, and audit workflows.
A generic Android deobfuscator that uses virtual execution to simplify obfuscated code for human analysis.
A browsable archive of decrypted NSA exploit tools and implants leaked by the Shadow Brokers in 2017.
A curated list of awesome YARA rules, tools, and resources for malware researchers and security professionals.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.