Showing 42 open source projects for "reverse engineering"

View related business solutions
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
    Learn More
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 1
    reverse-SynthID

    reverse-SynthID

    Reverse engineering Gemini's SynthID detection

    Reverse-SynthID is a research-focused project that analyzes and reverse-engineers Google’s SynthID watermarking system used in AI-generated images. It leverages signal processing and spectral analysis techniques to identify hidden watermark patterns without access to proprietary encoding methods. The project introduces a multi-resolution “SpectralCodebook” that maps watermark characteristics across different image sizes. Using this approach, it can detect SynthID watermarks with high...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    crawler

    crawler

    Collection of JS reverse engineering examples for web scraping study

    ...Many examples illustrate techniques such as debugging scripts, intercepting requests, analyzing encrypted parameters, and understanding authentication flows. crawler also explores common anti-scraping defenses and demonstrates how developers can examine them through debugging tools and reverse engineering techniques.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    pwndbg

    pwndbg

    Exploit Development and Reverse Engineering with GDB Made Easy

    Pwndbg is a fast, simple and lightweight tool for modern debugging. It improves debugging experience with the strength of GDB for low-level software developers, hardware hackers, reverse engineers, and exploit developers. It provides features crucial for efficient debugging in the world of low-level programming. Vanilla GDB is terrible to use for reverse engineering and exploit development. Typing x/g30x $esp is not fun, and does not confer much information. The year is 2024 and GDB still lacks a real hexdump command! ...
    Downloads: 51 This Week
    Last Update:
    See Project
  • 4
    frida

    frida

    Dynamic instrumentation toolkit for developers

    ...Frida is and will always be free software (free as in freedom). We want to empower the next generation of developer tools, and help other free software developers achieve interoperability through reverse engineering. We are proud that NowSecure is using Frida to do fast, deep analysis of mobile apps at scale. Frida has a comprehensive test-suite and has gone through years of rigorous testing across a broad range of use-cases.
    Downloads: 1,101 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 5
    URH (Universal Radio Hacker)

    URH (Universal Radio Hacker)

    Universal Radio Hacker: Investigate Wireless Protocols Like A Boss

    Universal Radio Hacker (URH) is a tool for investigating unknown wireless communication protocols. It supports signal capturing, decoding, modulation analysis, and protocol reverse engineering through an intuitive graphical interface. URH is used in research, security testing, and hobbyist electronics for understanding proprietary RF systems, IoT device communication, and embedded protocols.
    Downloads: 51 This Week
    Last Update:
    See Project
  • 6
    LAMDA

    LAMDA

    Android reverse engineering & automation framework

    Android reverse engineering & automation framework. The most powerful Android capture/reverse/HOOK & cloud phone/remote desktop/automation framework in history, your work has never been so easy and fast. LAMDA is an auxiliary framework for reverse engineering and automation. It is designed to reduce the time and trivial problems of security analysts and application testers.
    Downloads: 22 This Week
    Last Update:
    See Project
  • 7
    IDA Pro MCP

    IDA Pro MCP

    MCP Server for IDA Pro

    The IDA Pro MCP Server is a Model Context Protocol (MCP) server designed to integrate with IDA Pro, a popular disassembler and debugger. It enables AI assistants to interact with IDA Pro, facilitating tasks such as code analysis and reverse engineering. ​
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    FISSURE

    FISSURE

    The RF and reverse engineering framework for everyone

    FISSURE is an open-source radio frequency analysis and signal intelligence framework built to support software-defined radio research, wireless security experimentation, and protocol reverse engineering. The project brings together tools for capturing, inspecting, decoding, replaying, and analyzing RF signals across a wide range of wireless technologies. It is designed as a practical environment for researchers and operators who need to move from raw spectrum observation to structured investigation without stitching together too many separate utilities by hand. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    Binary Ninja MCP

    Binary Ninja MCP

    A Binary Ninja plugin, MCP server

    The Binary Ninja MCP is a plugin and bridge that integrates Binary Ninja with Large Language Model clients via the Model Context Protocol, enhancing reverse engineering workflows with AI assistance. ​
    Downloads: 7 This Week
    Last Update:
    See Project
  • Award-Winning Medical Office Software Designed for Your Specialty Icon
    Award-Winning Medical Office Software Designed for Your Specialty

    Succeed and scale your practice with cloud-based, data-backed, AI-powered healthcare software.

    RXNT is an ambulatory healthcare technology pioneer that empowers medical practices and healthcare organizations to succeed and scale through innovative, data-backed, AI-powered software.
    Learn More
  • 10
    ERAlchemy

    ERAlchemy

    Entity Relation Diagrams generation tool

    ERAlchemy is a tool that generates Entity-Relationship (ER) diagrams from databases or SQLAlchemy models and vice versa. It’s useful for database documentation, reverse engineering, and understanding complex schemas. ERAlchemy can export diagrams in formats like Graphviz and Mermaid, making it easy to include in reports or markdown files.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    Gemini-API

    Gemini-API

    Reverse-engineered Python API for Google Gemini web app

    Gemini-API is a community-created asynchronous Python wrapper for the web interface of Google’s Gemini models (formerly Bard). It is the result of reverse-engineering the Gemini web app and exposing its functionality through a programmatic API. This enables developers to incorporate Gemini into Python applications, scripts, bots, or tools without relying solely on official SDKs. The wrapper supports streaming responses, model selection, and handling of the web-based authentication/session mechanisms used by Google’s interface. ...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 12
    AndroidNativeEmu

    AndroidNativeEmu

    Allows you to partly emulate an Android native library

    AndroidNativeEmu is a Python-based framework designed to partially emulate Android native libraries, enabling developers and researchers to analyze and execute native code outside of a full Android environment. Instead of emulating an entire operating system, it focuses specifically on the native layer, allowing for targeted testing and reverse engineering of shared libraries (.so files). This makes it particularly useful in security research, malware analysis, and debugging of Android applications. The framework provides tools for loading binaries, simulating system calls, and interacting with native functions in a controlled environment. By abstracting away the complexity of full device emulation, it allows faster iteration and more focused analysis of specific components. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Integuru v0

    Integuru v0

    The first AI agent that builds permissionless integrations

    Integuru is an open-source AI agent designed to automatically create integrations between software platforms by reverse-engineering their internal APIs. Instead of relying on official developer documentation or publicly available APIs, the system analyzes network traffic generated by user interactions within a web application. Developers capture browser requests and authentication data, which the agent then uses to infer the structure of the platform’s internal API endpoints. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    HackerRepo.org

    HackerRepo.org

    Collection of cybersecurity-related references, scripts, tools, code

    ...The project is designed as a companion learning hub for security professionals, penetration testers, and researchers who want organized access to tools, references, and training material. It spans both offensive and defensive security topics, including exploit development, threat hunting, reverse engineering, AI security, and bug bounty methodologies. The repository is continuously maintained and categorized into specialized directories so users can quickly locate relevant learning material or utilities. Rather than being a single tool, it functions as an extensive reference library that supports skill development across the entire cybersecurity lifecycle. ...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 15
    JAX

    JAX

    Composable transformations of Python+NumPy programs

    With its updated version of Autograd, JAX can automatically differentiate native Python and NumPy functions. It can differentiate through loops, branches, recursion, and closures, and it can take derivatives of derivatives of derivatives. It supports reverse-mode differentiation (a.k.a. backpropagation) via grad as well as forward-mode differentiation, and the two can be composed arbitrarily to any order. What’s new is that JAX uses XLA to compile and run your NumPy programs on GPUs and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    ...As an Arch-based distribution, it benefits from the rolling release model, providing users with the latest software versions and kernel updates. BerserkArch is a dist "designed to make you powerful" for specific use cases like reverse-engineering binaries and automating exploits, rather than being an easy-to-use distribution for general beginners.
    Leader badge
    Downloads: 149 This Week
    Last Update:
    See Project
  • 17
    Yandex Music API

    Yandex Music API

    Non-official Python library for works with API service Index

    ...In addition to implementing a clean API, this library has a number of — high-level wrapping classes in order to make the development of customers and scripts simple and understandable. All documentation was written from scratch based on logical analysis during reverse development (reverse engineering) API.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    OWASP Mobile Application Security

    OWASP Mobile Application Security

    Manual for mobile app security testing and reverse engineering

    The OWASP Mobile Application Security (MAS) flagship project provides a security standard for mobile apps (OWASP MASVS) and a comprehensive testing guide (OWASP MASTG) that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results. MAS Advocates are industry adopters of the OWASP MASVS and MASTG who have invested a significant and consistent amount of resources...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 19
    Bard

    Bard

    Python SDK/API for reverse engineered Google Bard

    The Bard repository from acheong08 is an unofficial client library and set of tools designed to interact programmatically with Google Bard, Google’s conversational AI service, allowing developers to automate queries, integrate Bard into their own applications, and experiment with scripting around Bard-style prompts without relying on a formal, official API. Because Google doesn’t provide a standard public API for Bard, this project works by reverse-engineering the web interactions that power Bard’s interface and exposing them through code-friendly interfaces, enabling chat automation, custom workflows, and bot creation. The repository typically includes authentication handling, session management, and request/response serialization so that developers don’t have to deal with low-level HTTP details. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 20
    DracOS GNU/Linux Remastered
    ...This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based tools-tools the software using the CLI (command line interface) and GUI (graphical user interface) to perform its operations. Now Dracos currently already up to version 3.1.5 with the code name "KUNTILANAK WITH REMASTERED".
    Downloads: 27 This Week
    Last Update:
    See Project
  • 21
    OpenDrop

    OpenDrop

    An open Apple AirDrop implementation written in Python

    ...We support contacts-only devices by using extracted AirDrop credentials (keys and certificates) from macOS via our keychain extractor. OpenDrop is experimental software and is the result of reverse engineering efforts by the Open Wireless Link project. Therefore, it does not support all features of AirDrop or might be incompatible with future AirDrop versions. OpenDrop is not affiliated with or endorsed by Apple Inc. Use this code at your own risk.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    lxspider

    lxspider

    Educational Python web scraping case collection for many sites

    ...It focuses heavily on practical cases that illustrate how different platforms handle requests, authentication parameters, and anti-scraping protections. lxSpider includes examples targeting areas such as e-commerce platforms, social media services, content sites, research databases, and information portals. Many of the cases explore techniques related to request analysis, signature generation, and reverse engineering that are often needed when interacting with modern web applications. It also provides supplementary materials and tools used in crawling workflows, such as debugging utilities and reverse-engineering aids.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    py-kms

    py-kms

    KMS Server Emulator written in Python

    ...The emulator includes features such as logging, configurable network parameters, and persistent storage using SQLite. While it is often used for testing activation workflows, it also serves as a practical example of protocol emulation and reverse engineering in software systems.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 24
    Hackingtool

    Hackingtool

    ALL IN ONE Hacking Tool For Hackers

    HackingTool by Z4nzu is a large collection (“all-in-one”) of tools and scripts for penetration testing / hacking / OSINT etc. It bundles many utilities (port scanners, payload injectors, web attack tools, phishing tools, wireless attack tools, reverse engineering, etc.) into a menu interface. Includes many individual tools, often wrappers or aggregations of existing well-known tools (e.g. port scanners, web attack tools, steganography, hash cracking etc.). A menu interface offering categories: reconnaissance, payload creation, wireless attacks, reverse engineering, exploit frameworks, etc. ...
    Downloads: 21 This Week
    Last Update:
    See Project
  • 25
    Miasm

    Miasm

    Reverse engineering framework in Python

    ...Among them, the SSA/Out-of-SSA transformation, expression propagation and high-level operators can be joined to “lift” Miasm IR to a more human-readable language. We use graphviz to illustrate some graphs. Its layout does not always totally conform with a reverse engineering “ideal view”, so please be tolerant of those odd graphs. Miasm is not the first tool to implement this feature. But, well, as the tool already had everything needed to implement DSE, it was just a matter of time before these features landed in the main branch.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB