Radare2 is a complete rewrite of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks. It can edit files on local hard drives, view kernel memory, and debug programs locally or via a remote gdb/windbg servers. r2 can analyze, emulate, debug, modify, and disassemble any binary.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A Mac OS X computer forensics tool for analyzing system artifacts, user files, and logs with reputation verification and log aggregation capabilities.
Tool for parsing Android logs events and protobuf data
Turbinia is an open-source framework for automating the running of common forensic processing tools to help with processing evidence in the Cloud.
A simple Golang application for storing NIST National Software Reference Library Reference Data Set (NSRL RDS) with md5 and sha1 hash lookup searches.
A collection of tools for extracting and analyzing information from .git repositories
A script to assist in creating templates for VirtualBox to enhance VM detection evasion.
Diffy is a digital forensics and incident response (DFIR) tool developed by Netflix's Security Intelligence and Response Team (SIRT) for scoping compromises across cloud instances.
A network forensics tool for visualizing packet captures as network diagrams with detailed analysis.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.