| Col-E/Recaf |
5,406 |
|
0 |
0 |
about 2 years ago |
0 |
|
138 |
mit |
Java |
| The modern Java bytecode editor |
| Captainarash/The_Holy_Book_of_X86 |
873 |
|
0 |
0 |
about 7 years ago |
0 |
|
0 |
cc-by-sa-4.0 |
|
| A simple guide to x86 architecture, assembly, memory management, paging, segmentation, SMM, BIOS.... |
| pret/pokemon-reverse-engineering-tools |
297 |
|
0 |
0 |
over 3 years ago |
10 |
December 15, 2021 |
24 |
|
Python |
| Tools for building and disassembling Pokémon Red and Pokémon Crystal |
| Rair-Project/rair-core |
62 |
|
0 |
2 |
over 4 years ago |
1 |
December 28, 2019 |
15 |
lgpl-3.0 |
Rust |
| RAIR: RAdare In Rust |
| xtnded/codextended |
38 |
|
0 |
0 |
almost 3 years ago |
0 |
|
0 |
gpl-3.0 |
C |
| Call of Duty Extended |
| encounter/objdiff |
31 |
|
0 |
0 |
about 2 years ago |
0 |
|
12 |
apache-2.0 |
Rust |
| A local diffing tool for decompilation projects |
| mcdulltii/C-Experiments |
18 |
|
0 |
0 |
almost 6 years ago |
0 |
|
0 |
gpl-3.0 |
C |
| Experiments on C/C++ Exploits |
| Marco888Space/Reverse-Engineering-crackmes-with-Ghidra |
17 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
mit |
C |
| A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research. |
| Soxs/OSRSUpdater |
16 |
|
0 |
0 |
almost 7 years ago |
0 |
|
0 |
|
Java |
| A simple (and outdated) Old-School RuneScape decompiler/deobfuscator. Performs field and method analysis which uses ASM and bytecode patterns for identification. Identified fields could be used for creating bot clients or QoL clients. For educational use only. |
| haroohie-club/Wiinject |
13 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
gpl-3.0 |
C# |
| An assembly injector for Wii ROM hacking. Generates Riivolution memory patches given assembly & C files and an injection point. |