{"id":13508607,"url":"https://github.com/zer0condition/ReverseKit","last_synced_at":"2025-03-30T11:32:22.489Z","repository":{"id":148998960,"uuid":"618748378","full_name":"zer0condition/ReverseKit","owner":"zer0condition","description":"x64 Dynamic Reverse Engineering Toolkit","archived":false,"fork":false,"pushed_at":"2023-05-30T00:56:26.000Z","size":3968,"stargazers_count":592,"open_issues_count":0,"forks_count":92,"subscribers_count":15,"default_branch":"master","last_synced_at":"2024-11-01T08:33:38.169Z","etag":null,"topics":["bypass","hook","imgui","imports","reverseengineering","syscalls"],"latest_commit_sha":null,"homepage":"","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/zer0condition.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-03-25T08:27:05.000Z","updated_at":"2024-10-30T08:32:25.000Z","dependencies_parsed_at":"2023-07-23T11:45:50.520Z","dependency_job_id":null,"html_url":"https://github.com/zer0condition/ReverseKit","commit_stats":null,"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/zer0condition%2FReverseKit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/zer0condition%2FReverseKit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/zer0condition%2FReverseKit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/zer0condition%2FReverseKit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/zer0condition","download_url":"https://codeload.github.com/zer0condition/ReverseKit/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246314011,"owners_count":20757450,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bypass","hook","imgui","imports","reverseengineering","syscalls"],"created_at":"2024-08-01T02:00:55.558Z","updated_at":"2025-03-30T11:32:22.483Z","avatar_url":"https://github.com/zer0condition.png","language":"C++","readme":"\u003ch1 align=\"left\"\u003e\n  ReverseKit - Dynamic Reverse Engineering Toolkit\u003cbr\u003e\n  \u003cimg src=\"https://raw.githubusercontent.com/zer0condition/ReverseKit/master/ReverseKit.png\" height=250px alt=\"ReverseKit Logo\" align=\"right\"\u003e\n\u003c/h1\u003e\n\u003cp align=\"left\"\u003e\n  \u003cimg src=\"https://img.shields.io/github/license/zer0condition/reversekit?style=flat-square\" alt=\"License\"\u003e\n  \u003cimg src=\"https://img.shields.io/github/stars/zer0condition/reversekit\" alt=\"Stars\"\u003e\n  \u003cimg src=\"https://img.shields.io/github/forks/zer0condition/reversekit\" alt=\"Forks\"\u003e\n\u003c/p\u003e\n\u003cp\u003eReverseKit is a comprehensive toolkit designed to aid reverse engineers in the process of dynamic RE. With a wide range of features and functionalities, it provides an easy-to-use interface and helps you intercept, analyze, and manipulate code and data during runtime.\u003c/p\u003e\n\u003cp\u003e\n  \u003ca href=\"#features\"\u003eFeatures\u003c/a\u003e •\n  \u003ca href=\"#getting-started\"\u003eGetting Started\u003c/a\u003e •\n  \u003ca href=\"#usage\"\u003eUsage\u003c/a\u003e \u003cbr\u003e\n  \u003ca href=\"#contributing\"\u003eContributing\u003c/a\u003e •\n  \u003ca href=\"#license\"\u003eLicense\u003c/a\u003e •\n  \u003ca href=\"#images\"\u003eImages\u003c/a\u003e\n\u003c/p\u003e\n\u003ch2\u003eFeatures\u003c/h2\u003e\n\u003cul\u003e\n  \u003cli\u003eImports information - along with DLL name, function name, and address.\u003c/li\u003e\n  \u003cli\u003eIntercept all system calls via an instrumentation callback.\u003c/li\u003e\n  \u003cli\u003eIntercept all commands executed - system(), ShellExecuteEx(), etc.\u003c/li\u003e\n  \u003cli\u003eIntercept all thread creations - APIs like std::thread, CreateThread(), etc.\u003c/li\u003e\n  \u003cli\u003eIntercept URLs - APIs like UrlDownloadToFileA and InternetOpenUrlA, etc.\u003c/li\u003e\n  \u003cli\u003eThreads - lists thread ids along with cpu usage, allows you to suspend them with a button.\u003c/li\u003e\n  \u003cli\u003eHeaps information - address, id and flags.\u003c/li\u003e\n  \u003cli\u003eBypass common debugger checks - CheckRemoteDebugger() and IsDebuggerPresent().\u003c/li\u003e\n  \u003cli\u003eAnti-BSOD for common usermode BSOD methods which abuse RtlAdjustPrivilege.\u003c/li\u003e\n  \u003cli\u003ePrevent sysmon driver from being unloaded.\u003c/li\u003e\n  \u003cli\u003eEasy-to-use interface powered by ImGui.\u003c/li\u003e\n  \u003cli\u003eHook library with a normal JMP hook and trampoline hook.\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2\u003eGetting Started\u003c/h2\u003e\n\u003cp\u003eTo get started with ReverseKit, you can clone this repository and build the project. Once the build is complete, you can inject the tool using ReverseKit Loader, or any prefered injector and start using it to analyze binaries.\u003c/p\u003e\n\u003ch2\u003eUsage\u003c/h2\u003e\n\u003cp\u003eReverseKit provides a user-friendly interface that enables you to easily intercept, analyze, and manipulate code and data during runtime. With the wide range of features and functionalities, you can:\u003c/p\u003e\n\u003cul\u003e\n  \u003cli\u003eMonitor and intercept system calls and API functions\u003c/li\u003e\n  \u003cli\u003eMonitor CPU usage by active threads and option to suspend\u003c/li\u003e\n  \u003cli\u003eAnalyze network traffic and intercept URLs\u003c/li\u003e\n  \u003cli\u003eAnalyze and manipulate thread creations\u003c/li\u003e\n  \u003cli\u003eHook into binary code and redirect execution flow\u003c/li\u003e\n  \u003cli\u003eBypass common debugger checks\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch2\u003eContributing\u003c/h2\u003e\n\u003cp\u003eWe welcome contributions from the community. If you find a bug or have an idea for a new feature, please open an issue or submit a pull request.\u003c/p\u003e\n\n \u003ch2\u003eLicense\u003c/h2\u003e\n \u003cp\u003eThis project is licensed under the terms of the MIT license.\u003c/p\u003e\n \n \u003ch2\u003eSponsor\u003c/h1\u003e\n \n \u003cimg src=\"https://i.imgur.com/KEOydE7.png\" height=150px alt=\"WebSec BV logo\"\u003e\n \u003cp\u003e\u003cb\u003eWebSec BV\u003c/b\u003e, a cybersecurity company based in Amsterdam, is recognized for their dedication to helping businesses and individuals protect themselves against online threats. As a valued sponsor, they have contributed significantly to the promotion of cybersecurity and the creation of a safer online world.\u003c/p\u003e\n \u003cp\u003eWebSec's team of professionals is committed to staying ahead of the latest threats and developing cutting-edge solutions to keep their clients protected. Their passion for cybersecurity education has made them a trusted and reliable partner in the industry.\u003c/p\u003e\n \u003cp\u003eThrough their sponsorship and support, WebSec has demonstrated their commitment to promoting cybersecurity awareness and helping people stay safe online. Their contributions are greatly appreciated and have made a significant impact on the work being done in this field, such as making this project 'ReverseKit' a reality.\u003c/p\u003e\n \u003cp\u003eOverall, WebSec BV is a trusted and respected leader in the fight against cybercrime, and their sponsorship and support have been instrumental in promoting a safer online world. They are a valued partner and their contributions to this important work are truly appreciated.\u003c/p\u003e\n\u003cp\u003e\nWebsite: \u003ca href=\"https://websec.nl/en/\"\u003ewebsec.nl\u003c/a\u003e \u003cbr\u003e\nBlog: \u003ca href=\"https://websec.nl/blog/\"\u003ewebsec.nl/blog\u003c/a\u003e\n\u003c/p\u003e\n\n\n\u003ch2\u003eImages\u003c/h2\u003e\n\u003cdiv\u003e\n  \u003cimg src=\"https://i.imgur.com/jgGg4tt.jpg\" alt=\"tab\"\u003e\n\u003c/div\u003e\n\n\u003ch2\u003eYoutube\u003c/h2\u003e\n\u003cdiv\u003e\n  \u003ca href=\"https://www.youtube.com/watch?v=3P8ck5U_OXY\"\u003eReverseKit YouTube Demo 1\u003c/a\u003e \u003cbr\u003e\n  \u003ca href=\"https://www.youtube.com/watch?v=3lAU0GWPQAA\"\u003eReverseKit YouTube Demo 2\u003c/a\u003e \u003cbr\u003e\n\u003c/div\u003e\n","funding_links":[],"categories":["C++","bypass","🔧 Packages"],"sub_categories":["⚡ Analyzing"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fzer0condition%2FReverseKit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fzer0condition%2FReverseKit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fzer0condition%2FReverseKit/lists"}