Forwarded from Itay Cohen
We just released Cutter v1.9 on #r2con2019 with a HUGE surprise -
a full integration of Ghidra decompiler in Cutter! 🥳
Download v1.9 with the Decompiler from https://cutter.re
For more info, check out our Twitter thread --> https://twitter.com/r2gui/status/1169912280001208321
a full integration of Ghidra decompiler in Cutter! 🥳
Download v1.9 with the Decompiler from https://cutter.re
For more info, check out our Twitter thread --> https://twitter.com/r2gui/status/1169912280001208321
Twitter
Cutter
We just released Cutter v1.9 on #r2con2019 with a HUGE surprise - a full integration of Ghidra decompiler in Cutter! 🥳 Download v1.9 with the Decompiler from https://t.co/BTHs8EYTKs For more info, keep reading >>
GoAccess is an open source real-time web log analyzer and interactive viewer that runs in a terminal in *nix systems or through your browser.
https://goaccess.io/
https://goaccess.io/
goaccess.io
GoAccess - Visual Web Log Analyzer
GoAccess is an open source real-time web log analyzer and interactive viewer that runs in a terminal in *nix systems or through your browser.
This media is not supported in your browser
VIEW IN TELEGRAM
gdbida - a visual bridge between a GDB session and IDA Pro's disassembler
https://github.com/Comsecuris/gdbida
https://github.com/Comsecuris/gdbida
This page deals with the PE format, or more specifically, x86/x64 Windows (from XP to W7) binaries.
https://corkamiwiki.github.io/PE
https://corkamiwiki.github.io/PE
A VBA parser and emulation engine to analyze malicious macros.
https://github.com/decalage2/ViperMonkey
https://github.com/decalage2/ViperMonkey
GitHub
GitHub - decalage2/ViperMonkey: A VBA parser and emulation engine to analyze malicious macros.
A VBA parser and emulation engine to analyze malicious macros. - decalage2/ViperMonkey
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
https://github.com/ChrisTheCoolHut/Zeratool
https://github.com/ChrisTheCoolHut/Zeratool
GitHub
GitHub - ChrisTheCoolHut/Zeratool: Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems - ChrisTheCoolHut/Zeratool
FLARE VM - a fully customizable, Windows-based security distribution for malware analysis, incident response, penetration testing, etc.
https://github.com/fireeye/flare-vm
https://github.com/fireeye/flare-vm
GitHub
GitHub - mandiant/flare-vm: A collection of software installations noscripts for Windows systems that allows you to easily setup…
A collection of software installations noscripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM. - mandiant/flare-vm