Showing 42 open source projects for "reverse engineering"

View related business solutions
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    reverse-SynthID

    reverse-SynthID

    Reverse engineering Gemini's SynthID detection

    Reverse-SynthID is a research-focused project that analyzes and reverse-engineers Google’s SynthID watermarking system used in AI-generated images. It leverages signal processing and spectral analysis techniques to identify hidden watermark patterns without access to proprietary encoding methods. The project introduces a multi-resolution “SpectralCodebook” that maps watermark characteristics across different image sizes. Using this approach, it can detect SynthID watermarks with high...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    crawler

    crawler

    Collection of JS reverse engineering examples for web scraping study

    ...Many examples illustrate techniques such as debugging scripts, intercepting requests, analyzing encrypted parameters, and understanding authentication flows. crawler also explores common anti-scraping defenses and demonstrates how developers can examine them through debugging tools and reverse engineering techniques.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    URH (Universal Radio Hacker)

    URH (Universal Radio Hacker)

    Universal Radio Hacker: Investigate Wireless Protocols Like A Boss

    Universal Radio Hacker (URH) is a tool for investigating unknown wireless communication protocols. It supports signal capturing, decoding, modulation analysis, and protocol reverse engineering through an intuitive graphical interface. URH is used in research, security testing, and hobbyist electronics for understanding proprietary RF systems, IoT device communication, and embedded protocols.
    Downloads: 63 This Week
    Last Update:
    See Project
  • 4
    pwndbg

    pwndbg

    Exploit Development and Reverse Engineering with GDB Made Easy

    Pwndbg is a fast, simple and lightweight tool for modern debugging. It improves debugging experience with the strength of GDB for low-level software developers, hardware hackers, reverse engineers, and exploit developers. It provides features crucial for efficient debugging in the world of low-level programming. Vanilla GDB is terrible to use for reverse engineering and exploit development. Typing x/g30x $esp is not fun, and does not confer much information. The year is 2024 and GDB still lacks a real hexdump command! ...
    Downloads: 29 This Week
    Last Update:
    See Project
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 5
    frida

    frida

    Dynamic instrumentation toolkit for developers

    ...Frida is and will always be free software (free as in freedom). We want to empower the next generation of developer tools, and help other free software developers achieve interoperability through reverse engineering. We are proud that NowSecure is using Frida to do fast, deep analysis of mobile apps at scale. Frida has a comprehensive test-suite and has gone through years of rigorous testing across a broad range of use-cases.
    Downloads: 735 This Week
    Last Update:
    See Project
  • 6
    LAMDA

    LAMDA

    Android reverse engineering & automation framework

    Android reverse engineering & automation framework. The most powerful Android capture/reverse/HOOK & cloud phone/remote desktop/automation framework in history, your work has never been so easy and fast. LAMDA is an auxiliary framework for reverse engineering and automation. It is designed to reduce the time and trivial problems of security analysts and application testers.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 7
    IDA Pro MCP

    IDA Pro MCP

    MCP Server for IDA Pro

    The IDA Pro MCP Server is a Model Context Protocol (MCP) server designed to integrate with IDA Pro, a popular disassembler and debugger. It enables AI assistants to interact with IDA Pro, facilitating tasks such as code analysis and reverse engineering. ​
    Downloads: 7 This Week
    Last Update:
    See Project
  • 8
    Binary Ninja MCP

    Binary Ninja MCP

    A Binary Ninja plugin, MCP server

    The Binary Ninja MCP is a plugin and bridge that integrates Binary Ninja with Large Language Model clients via the Model Context Protocol, enhancing reverse engineering workflows with AI assistance. ​
    Downloads: 6 This Week
    Last Update:
    See Project
  • 9
    FISSURE

    FISSURE

    The RF and reverse engineering framework for everyone

    FISSURE is an open-source radio frequency analysis and signal intelligence framework built to support software-defined radio research, wireless security experimentation, and protocol reverse engineering. The project brings together tools for capturing, inspecting, decoding, replaying, and analyzing RF signals across a wide range of wireless technologies. It is designed as a practical environment for researchers and operators who need to move from raw spectrum observation to structured investigation without stitching together too many separate utilities by hand. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Full-stack observability with actually useful AI | Grafana Cloud Icon
    Full-stack observability with actually useful AI | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    ERAlchemy

    ERAlchemy

    Entity Relation Diagrams generation tool

    ERAlchemy is a tool that generates Entity-Relationship (ER) diagrams from databases or SQLAlchemy models and vice versa. It’s useful for database documentation, reverse engineering, and understanding complex schemas. ERAlchemy can export diagrams in formats like Graphviz and Mermaid, making it easy to include in reports or markdown files.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    Gemini-API

    Gemini-API

    Reverse-engineered Python API for Google Gemini web app

    Gemini-API is a community-created asynchronous Python wrapper for the web interface of Google’s Gemini models (formerly Bard). It is the result of reverse-engineering the Gemini web app and exposing its functionality through a programmatic API. This enables developers to incorporate Gemini into Python applications, scripts, bots, or tools without relying solely on official SDKs. The wrapper supports streaming responses, model selection, and handling of the web-based authentication/session mechanisms used by Google’s interface. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 12
    AndroidNativeEmu

    AndroidNativeEmu

    Allows you to partly emulate an Android native library

    AndroidNativeEmu is a Python-based framework designed to partially emulate Android native libraries, enabling developers and researchers to analyze and execute native code outside of a full Android environment. Instead of emulating an entire operating system, it focuses specifically on the native layer, allowing for targeted testing and reverse engineering of shared libraries (.so files). This makes it particularly useful in security research, malware analysis, and debugging of Android applications. The framework provides tools for loading binaries, simulating system calls, and interacting with native functions in a controlled environment. By abstracting away the complexity of full device emulation, it allows faster iteration and more focused analysis of specific components. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Integuru v0

    Integuru v0

    The first AI agent that builds permissionless integrations

    Integuru is an open-source AI agent designed to automatically create integrations between software platforms by reverse-engineering their internal APIs. Instead of relying on official developer documentation or publicly available APIs, the system analyzes network traffic generated by user interactions within a web application. Developers capture browser requests and authentication data, which the agent then uses to infer the structure of the platform’s internal API endpoints. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    HackerRepo.org

    HackerRepo.org

    Collection of cybersecurity-related references, scripts, tools, code

    ...The project is designed as a companion learning hub for security professionals, penetration testers, and researchers who want organized access to tools, references, and training material. It spans both offensive and defensive security topics, including exploit development, threat hunting, reverse engineering, AI security, and bug bounty methodologies. The repository is continuously maintained and categorized into specialized directories so users can quickly locate relevant learning material or utilities. Rather than being a single tool, it functions as an extensive reference library that supports skill development across the entire cybersecurity lifecycle. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 15
    JAX

    JAX

    Composable transformations of Python+NumPy programs

    With its updated version of Autograd, JAX can automatically differentiate native Python and NumPy functions. It can differentiate through loops, branches, recursion, and closures, and it can take derivatives of derivatives of derivatives. It supports reverse-mode differentiation (a.k.a. backpropagation) via grad as well as forward-mode differentiation, and the two can be composed arbitrarily to any order. What’s new is that JAX uses XLA to compile and run your NumPy programs on GPUs and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    BerserkArch

    BerserkArch

    A bleeding-edge, security-centric Arch-based Linux distribution.

    ...As an Arch-based distribution, it benefits from the rolling release model, providing users with the latest software versions and kernel updates. BerserkArch is a dist "designed to make you powerful" for specific use cases like reverse-engineering binaries and automating exploits, rather than being an easy-to-use distribution for general beginners.
    Leader badge
    Downloads: 229 This Week
    Last Update:
    See Project
  • 17
    Yandex Music API

    Yandex Music API

    Non-official Python library for works with API service Index

    ...In addition to implementing a clean API, this library has a number of — high-level wrapping classes in order to make the development of customers and scripts simple and understandable. All documentation was written from scratch based on logical analysis during reverse development (reverse engineering) API.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 18
    OWASP Mobile Application Security

    OWASP Mobile Application Security

    Manual for mobile app security testing and reverse engineering

    The OWASP Mobile Application Security (MAS) flagship project provides a security standard for mobile apps (OWASP MASVS) and a comprehensive testing guide (OWASP MASTG) that covers the processes, techniques, and tools used during a mobile app security test, as well as an exhaustive set of test cases that enables testers to deliver consistent and complete results. MAS Advocates are industry adopters of the OWASP MASVS and MASTG who have invested a significant and consistent amount of resources...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 19
    Bard

    Bard

    Python SDK/API for reverse engineered Google Bard

    The Bard repository from acheong08 is an unofficial client library and set of tools designed to interact programmatically with Google Bard, Google’s conversational AI service, allowing developers to automate queries, integrate Bard into their own applications, and experiment with scripting around Bard-style prompts without relying on a formal, official API. Because Google doesn’t provide a standard public API for Bard, this project works by reverse-engineering the web interactions that power Bard’s interface and exposing them through code-friendly interfaces, enabling chat automation, custom workflows, and bot creation. The repository typically includes authentication handling, session management, and request/response serialization so that developers don’t have to deal with low-level HTTP details. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    DracOS GNU/Linux Remastered
    ...This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based tools-tools the software using the CLI (command line interface) and GUI (graphical user interface) to perform its operations. Now Dracos currently already up to version 3.1.5 with the code name "KUNTILANAK WITH REMASTERED".
    Downloads: 29 This Week
    Last Update:
    See Project
  • 21
    OpenDrop

    OpenDrop

    An open Apple AirDrop implementation written in Python

    ...We support contacts-only devices by using extracted AirDrop credentials (keys and certificates) from macOS via our keychain extractor. OpenDrop is experimental software and is the result of reverse engineering efforts by the Open Wireless Link project. Therefore, it does not support all features of AirDrop or might be incompatible with future AirDrop versions. OpenDrop is not affiliated with or endorsed by Apple Inc. Use this code at your own risk.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    lxspider

    lxspider

    Educational Python web scraping case collection for many sites

    ...It focuses heavily on practical cases that illustrate how different platforms handle requests, authentication parameters, and anti-scraping protections. lxSpider includes examples targeting areas such as e-commerce platforms, social media services, content sites, research databases, and information portals. Many of the cases explore techniques related to request analysis, signature generation, and reverse engineering that are often needed when interacting with modern web applications. It also provides supplementary materials and tools used in crawling workflows, such as debugging utilities and reverse-engineering aids.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    py-kms

    py-kms

    KMS Server Emulator written in Python

    ...The emulator includes features such as logging, configurable network parameters, and persistent storage using SQLite. While it is often used for testing activation workflows, it also serves as a practical example of protocol emulation and reverse engineering in software systems.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    Hackingtool

    Hackingtool

    ALL IN ONE Hacking Tool For Hackers

    HackingTool by Z4nzu is a large collection (“all-in-one”) of tools and scripts for penetration testing / hacking / OSINT etc. It bundles many utilities (port scanners, payload injectors, web attack tools, phishing tools, wireless attack tools, reverse engineering, etc.) into a menu interface. Includes many individual tools, often wrappers or aggregations of existing well-known tools (e.g. port scanners, web attack tools, steganography, hash cracking etc.). A menu interface offering categories: reconnaissance, payload creation, wireless attacks, reverse engineering, exploit frameworks, etc. ...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 25
    Miasm

    Miasm

    Reverse engineering framework in Python

    ...Among them, the SSA/Out-of-SSA transformation, expression propagation and high-level operators can be joined to “lift” Miasm IR to a more human-readable language. We use graphviz to illustrate some graphs. Its layout does not always totally conform with a reverse engineering “ideal view”, so please be tolerant of those odd graphs. Miasm is not the first tool to implement this feature. But, well, as the tool already had everything needed to implement DSE, it was just a matter of time before these features landed in the main branch.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB