Reversing With Lena (Tutorials) by lena151 is a collection of educational resources focused on reverse engineering, providing tutorials and guides for beginners and advanced users alike. The content covers various topics such as disassembly, debugging, malware analysis, and more, offering valuable insights into the world of cybersecurity.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Discontinued project for file-less persistence, attacks, and anti-forensic capabilities on Windows 7 32-bit systems.
Studying Android malware behaviors through Information Flow monitoring techniques.
Checksec is a bash script to check the properties of executables like PIE, RELRO, Canaries, ASLR, Fortify Source.
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
Define and validate YARA rule metadata with CCCS YARA Specification.
Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.
A command-line tool for identifying NoSQL injection vulnerabilities in MongoDB databases
One stop shop for decompiling Android apps with a focus on regenerating R references.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.