Hex editor for reverse engineers.
Outils pour analyze
Inspect, disassemble or reverse engineer binaries and traffic.
140 tools indexed
Manage threat intel at scale.
JADX
—Dex-to-Java decompiler.
Standalone Java decompiler GUI.
Java decompiler and assembler.
Visualize Windows logon events.
Loki
—Simple IOC and YARA scanner.
MISP
—Threat intelligence sharing platform.
Microsoft Threat Intelligence in Python.
iOS and macOS decompiler.
Graph-based OSINT and link analysis.
Symbolic execution for binaries and smart contracts.
Open-source security data lake on AWS.
Memory forensics as a filesystem.
Mobile app security testing.
Symbolic-execution for EVM bytecode.
Open-source threat modeling.
Runtime mobile exploration via Frida.
Benchmark prompt-injection attacks on LLMs.
Open cyber threat intelligence platform.
Direct Memory Access attack toolkit.
PEDA
—Python Exploit Development Assistance for GDB.
Evaluate IAM permissions in AWS.
C++ library for packet capture and crafting.