awesome-computer-science
Collect computer related materials and codes
https://github.com/perfectplug/awesome-computer-science
Last synced: about 10 hours ago
JSON representation
-
Hack Program
- code - [awesome-windows-exploitation](https://github.com/enddo/awesome-windows-exploitation) - A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom
- material - DDOS RESEARCH DATA OPEN-SOURCED ON SCANS.IO
- code - [cuckoo](https://github.com/cuckoosandbox/cuckoo) - Cuckoo Sandbox is an automated dynamic malware analysis system http://www.cuckoosandbox.org
- code - [CAPE](https://github.com/ctxis/CAPE) - Malware Configuration And Payload Extraction https://cape.contextis.com/analysis.CAPE is a malware sandbox. It is derived from Cuckoo and is designed to automate the process of malware analysis with the goal of extracting payloads and configuration from malware. This allows CAPE to detect malware based on payload signatures, as well as automating many of the goals of malware reverse engineering and threat intelligence.
- code - [botnets](https://github.com/maestron/botnets) - This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
- code - [LeakLooker](https://github.com/woj-ciech/LeakLooker) - Find open databases with Shodan
- code - [cuckoo-modified](https://github.com/spender-sandbox/cuckoo-modified) - Modified edition of cuckoo.
- code - [sploits](https://github.com/niklasb/sploits)
- code - [DriverInjectDll](https://github.com/strivexjun/DriverInjectDll) - Use Driver Global Memory Load DLL
- code - [Injectors](https://github.com/rootm0s/Injectors) - DLL/Shellcode injection techniques
- code - [UniversalInject](https://github.com/dwendt/UniversalInject) - Windows IME-based DLL injection. Able to inject a DLL without OpenProcess or a process handle being necessary..
- code - [h-encore](https://github.com/TheOfficialFloW/h-encore) - Fully chained kernel exploit for the PS Vita
-
Game Engine
- bs::framework
- SuperSocket
- freeablo
- code - [forgottenserver](https://github.com/otland/forgottenserver) - A free and open-source MMORPG server emulator written in C++ https://otland.net/
- code - [Quick-Cocos2dx-Community](https://github.com/u0u0/Quick-Cocos2dx-Community) - Cocos2d-Lua 社区版 http://www.cocos2d-lua.org
- code - [SuperSocket](https://github.com/kerryjiang/SuperSocket) - SuperSocket is a light weight, cross platform and extensible socket server application framework.
- code - [cocos2d-x](https://github.com/cocos2d/cocos2d-x) - Cocos2d-x is a suite of open-source, cross-platform, game-development tools used by millions of developers all over the world.
- code - [freeablo](https://github.com/wheybags/freeablo) - Modern reimplementation of the Diablo 1 game engine
- code - [bsf](https://github.com/gamefoundry/bsf) - bs::framework is a C++ library that aims to provide a unified foundation for the development of real-time graphical applications, whether games, engines or tools.
- bs::framework
- SuperSocket
- code - [SuperSocket.ClientEngine](https://github.com/kerryjiang/SuperSocket.ClientEngine) - A .NET library which can make your socket client development easier
- code - [Simple-Web-Server](https://gitlab.com/eidheim/Simple-Web-Server) - A very simple, fast, multithreaded, platform independent HTTP and HTTPS server and client library implemented using C++11 and Boost.Asio. Created to be an easy way to make REST resources available from C++ applications.
- bs::framework
- bs::framework
- bs::framework
-
Reverse Engine
- miasm
- doc - miasm2 module API
- pdf - Symbolic Deobfuscation: From Virtualized Code Back to the Original
- page - Manticore: Symbolic execution for humans
- Doc - [IDAPython](https://www.hex-rays.com/products/ida/support/idapython_docs/) - This document contains the API (Application Programming Interface) documentation for IDAPython. Documentation for the Python objects defined by the project is divided into separate pages for each package, module, and class. The API documentation also includes two pages containing information about the project as a whole: a trees page, and an index page.
- Tickling VMProtect with LLVM: Part 1
- Tickling VMProtect with LLVM: Part 2
- Tickling VMProtect with LLVM: Part 3
- code - [Triton](https://github.com/JonathanSalwan/Triton) - Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine, AST representations of the x86 and the x86-64 instructions set semantics, SMT simplification passes, an SMT Solver Interface and, the last but not least, Python bindings.
- List - List of awesome reverse engineering resources
- code - [uEmu](https://github.com/alexhude/uEmu) - Tiny cute emulator plugin for IDA based on unicorn.
- Manticore
- code - [YaCo](https://github.com/DGA-MI-SSI/YaCo) - YaCo is an Hex-Rays IDA plugin. When enabled, multiple users can work simultaneously on the same binary. Any modification done by any user is synchronized through git version control.
- code - [Ponce](https://github.com/illera88/Ponce) - IDA 2016 plugin contest winner! Symbolic Execution just one-click away!Ponce (pronounced [ 'poN θe ] pon-they ) is an IDA Pro plugin that provides users the ability to perform taint analysis and symbolic execution over binaries in an easy and intuitive fashion. With Ponce you are one click away from getting all the power from cutting edge symbolic execution. Entirely written in C/C++.
- code - [VMAttack](https://github.com/anatolikalysch/VMAttack) - VMAttack PlugIn for IDA Pro.IDA Pro Plugin for static and dynamic virtualization-based packed analysis and deobfuscation.VMAttack was awarded the second place at the annual IDA Pro Plug-in Contest in 2016!
- code - [xAnalyzer](https://github.com/ThunderCls/xAnalyzer) - xAnalyzer plugin for x64dbg
- code - [binwalk](https://github.com/ReFirmLabs/binwalk) - Firmware Analysis Tool.Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.
- code - [pocs](https://github.com/corkami/pocs) - Proof of Concepts (PE, PDF...)
- code - [angr](https://github.com/angr/angr) - angr is a platform-agnostic binary analysis framework. It is brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, their associated CTF team, Shellphish, the open source community, and @rhelmot.
- code - [PE-sieve](https://github.com/hasherezade/pe-sieve) - PE-sieve is a light-weight tool that helps to detect malware running on the system, as well as to collect the potentially malicious material for further analysis. Recognizes and dumps variety of implants within the scanned process: replaced/injected PEs, shellcodes, hooks, and other in-memory patches.
- code - [NoVmp](https://github.com/can1357/NoVmp) - [Writing An Optimizing IL Compiler, For Dummies, By A Dummy: 0x1 Symbolic Expressions](https://blog.can.ac/2020/04/11/writing-an-optimizing-il-compiler-for-dummies-by-a-dummy/)
- code - [IDAPython](https://github.com/idapython/src) - IDAPython project for Hex-Ray's IDA Pro http://www.hex-rays.com/
- code - [IDArling](https://github.com/IDArlingTeam/IDArling) - Collaborative Reverse Engineering plugin for IDA Pro & Hex-Rays https://idarling.re
- code - [keypatch](https://github.com/keystone-engine/keypatch) - Multi-architecture assembler for IDA Pro. Powered by Keystone Engine. http://www.keystone-engine.org/keypatch
- code - [miasm](https://github.com/cea-sec/miasm/) - Reverse engineering framework in Python.Miasm is a free and open source (GPLv2) reverse engineering framework. Miasm aims to analyze / modify / generate binary programs.
- code - [Tigress_protection](https://github.com/JonathanSalwan/Tigress_protection) - Playing with the Tigress binary protection. Break some of its protections and solve some of its challenges. Automatic deobfuscation using symbolic execution, taint analysis and LLVM.
- code - [ret-sync](https://github.com/bootleg/ret-sync) - ret-sync stands for Reverse-Engineering Tools synchronization. It's a set of plugins that help to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg/OllyDbg2/x64dbg) with IDA disassembler. The underlying idea is simple: take the best from both worlds (static and dynamic analysis).
- code - [ida-efiutils](https://github.com/snare/ida-efiutils) - Some scripts for IDA Pro to assist with reverse engineering EFI binaries
- code - [anti-debug](https://github.com/alphaSeclab/anti-debug) -
- book - [r2frida-book](https://github.com/nowsecure/r2frida-book) - The radare2 + frida book for Mobile Application assessment https://www.nowsecure.com
- Book - "Reverse Engineering for Beginners" free book http://beginners.re
- code - [binsec](https://github.com/binsec/binsec) - BINSEC binary-level open-source platform
- Doc - [IDAPython](https://www.hex-rays.com/products/ida/support/idapython_docs/) - This document contains the API (Application Programming Interface) documentation for IDAPython. Documentation for the Python objects defined by the project is divided into separate pages for each package, module, and class. The API documentation also includes two pages containing information about the project as a whole: a trees page, and an index page.
- code - [PEExplorer](https://github.com/zodiacon/PEExplorer) - Portable Executable Explorer
- code - [AntiDebug](https://github.com/CoderAldrich/AntiDebug) - 此目录收集整理反调试方法
- code - [IDAStealth-v1.3.3](https://github.com/wanttobeno/IDAStealth-v1.3.3) - IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger
- code - [idasec](https://github.com/RobinDavid/idasec) - IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform
- code - [Python_editor](https://github.com/techbliss/Python_editor) - Better CodeEditor for Ida Pro.
- code - [Sark](https://github.com/tmr232/Sark) - IDAPython Made Easy http://sark.readthedocs.io
- code - [Api-Break-for-x64dbg](https://github.com/0ffffffffh/Api-Break-for-x64dbg) - x64dbg plugin to set breakpoints automatically to Win32/64 APIs
- code - [CeAutoAsm-x64dbg](https://github.com/atom0s/CeAutoAsm-x64dbg) - An x64dbg plugin that allows users to execute Cheat Engine auto assembler scripts within x64dbg.
- code - [vmp3.2crack](https://github.com/wanttobeno/vmp3.2crack) - [[调试逆向] [虚拟机保护] [原创]VMP3.2授权分析](https://bbs.pediy.com/thread-247442.htm)
- code - ~~[VmpHandle](https://github.com/wanttobeno/VmpHandle)~~
- code - ~~[VmP_DBG](https://github.com/0xbadc0de1/VmP_DBG)~~ - ~~This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the vmp bytecode level. It was made using TitanEngine for the debug engine and Qt for the gui. Do not expect much of it and feel free to report any bugs.~~
- code - ~~[VMPDBG2](https://github.com/uvbs/VMPDBG2)~~ - ~~VMPDBG is a (GUI included) debugger and devirtualizer for x86 obfuscted code that was obfuscated by VMProtect. This project was designed only for scientific purposes and / or malware analysis.~~
- code - [VMHunt](https://github.com/s3team/VMHunt) - VMHunt: Extraction and Simplification of Virtualized Binary Code.
- code - [pinvmp](https://github.com/lmy375/pinvmp) - PinVMP:虚拟化代码辅助分析工具
- code - [VMP_ODPlugin](https://github.com/OoWoodOne/VMP_ODPlugin) - [[原创]VMP分析handler与脱壳插件&源码](https://bbs.pediy.com/thread-203683.htm)
- angr
- doc - angr Documentation
-
Decompiler
- code - [recompiler](https://github.com/rexdex/recompiler) - Xbox360 -> Windows executable converter
- code - [decompiler](https://github.com/EiNSTeiN-/decompiler) - A decompiler with multiple backend support, written in Python. Works with IDA and Capstone.
- code - [ljd](https://github.com/perfectplug/ljd) - The original name was ljwthgnd as in LuaJIT 'What The Hell is Going On' Decompiler named under the LuaJIT C sources variable naming convention.
-
Compiler
-
Fuzzing
- code - A hypervisor for fuzzing built with WHVP and Bochs
-
Operation System
- code - [MemProcFS](https://github.com/ufrisk/MemProcFS) - The Memory Process File System:
- os_course_info - 清华大学操作系统课程(2018)
-
Windows Kernel
- code - [DriverMon](https://github.com/zodiacon/DriverMon)
-
Emulator
- code - Cmulator is ( x86 - x64 ) Scriptable Reverse Engineering Sandbox Emulator for shellcode and PE binaries . Based on Unicorn & Capstone Engine & javascript
-
Virtualization
- code - [GuardMon](https://github.com/tandasat/GuardMon) - Hypervisor based tool for monitoring system register accesses.
Programming Languages
Categories
Sub Categories
Keywords
reverse-engineering
7
symbolic-execution
5
ida-pro
3
python
3
ida-plugin
3
ida
3
security
3
disassembler
2
cocos2d-x
2
opengl
2
assembler
2
idapro
2
analysis
2
debugger
2
c-plus-plus
2
dynamic-analysis
2
emulator
2
program-analysis
2
taint-analysis
2
deobfuscation
2
gamedev
2
binary-analysis
2
linx
1
plugin
1
x64dbg
1
ios
1
xanalyzer-plugin
1
csharp
1
realtime-communication
1
socket
1
socketserver
1
tcp
1
udp
1
android
1
game-engine
1
binary-translation
1
cocos2d
1
game-development
1
cocos2d-lua
1
cocostudio
1
dragonbones
1
openapi
1
server
1
quick-cocos2d-x-lua
1
mmorpg
1
spine
1
blockchain
1
emulation
1
ethereum
1
game-server
1