PINCE
PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets. It uses GitHub's API to fetch data and then uses various techniques to identify potential secrets. It's designed to be used in conjunction with other tools and techniques to identify and remediate sensitive data. It's a powerful tool for identifying potential security risks in public GitHub repositories.
PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.
A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.
A collection of YARA rules for public use, built from intelligence profiles and file work.
Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.
A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.
Yara module for Node.js