- How quickly can you understand Open Source Projects? https://github.com/0xd4d/dnSpy 21 comments csharp
- .NET debugger and assembly editor https://github.com/0xd4d/dnspy 3 comments csharp
Linking pages
- GitHub - nxrighthere/UnrealCLR: Unreal Engine .NET 6 integration https://github.com/nxrighthere/unrealclr 189 comments
- GitHub - quozd/awesome-dotnet: A collection of awesome .NET libraries, tools, frameworks and software https://github.com/quozd/awesome-dotnet 54 comments
- You can't contain me! :: Analyzing and Exploiting an Elevation of Privilege Vulnerability in Docker for Windows https://srcincite.io/blog/2018/08/31/you-cant-contain-me-analyzing-and-exploiting-an-elevation-of-privilege-in-docker-for-windows.html 46 comments
- Reverse Engineering a North Korean Sim City Game – Digital NK https://digitalnk.com/blog/2019/04/21/reverse-engineering-a-north-korean-sim-city-game/ 29 comments
- 10 Essential Debugging Tools for C# .NET Development | Michael's Coding Spot https://michaelscodingspot.com/dotnet-debugging-tools/ 25 comments
- How Escape from Tarkov ensures game integrity | secret club https://secret.club/2020/04/16/mono-integrity.html 15 comments
- Reverse Engineering Resources-Beginners to intermediate Guide/Links | by Bbinfosec | Medium https://medium.com/@vignesh4303/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed 8 comments
- Consider using C# 8 with the .NET Framework | by Joni 【ジョニー】 | Medium https://medium.com/@joni2nja/consider-using-c-8-with-the-net-framework-9dceb20647c5?amp%3Bsk=b9dc44395406649afe439755308b615f&source=friends_link 6 comments
- A curated list of Assembly Language / Reversing / Malware Analysis / Game Hacking-resources · GitHub https://gist.github.com/muff-in/ff678b1fda17e6188aa0462a99626121 5 comments
- Configure HttpClientFactory to Use Fiddler in .NET Core Microservices-based Docker Containers | by Joni 【ジョニー】 | Medium https://medium.com/@joni2nja/configure-httpclientfactory-to-use-fiddler-in-net-core-microservices-based-docker-containers-2540bd87c14?amp%3Bsk=3f32d131e802f9d0be85981c5dbe2726&source=friends_link 5 comments
- Debug & Catch Exceptions in Visual Studio: The Complete Guide | Michael's Coding Spot https://michaelscodingspot.com/debugging-exceptions/ 4 comments
- Introducing SharpSploit: A C# Post-Exploitation Library | by Ryan Cobb | Posts By SpecterOps Team Members https://posts.specterops.io/introducing-sharpsploit-a-c-post-exploitation-library-5c7be5f16c51 3 comments
- Bypassing Xamarin Certificate Pinning on Android - GoSecure https://www.gosecure.net/blog/2020/04/06/bypassing-xamarin-certificate-pinning-on-android/ 3 comments
- Modding Games and Freezing Fish https://blog.witchoflight.com/2019/modding-games-and-freezing-fish/ 0 comments
- Vulnerabilities in ATM Milano's mobile app – Jacopo Jannone - blog https://blog.jacopojannone.com/en/post/atm-app-vulnerability/ 0 comments
- GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things https://github.com/enaqx/awesome-pentest 0 comments
- GitHub - carpedm20/awesome-hacking: A curated list of awesome Hacking tutorials, tools and resources https://github.com/carpedm20/awesome-hacking 0 comments
- Removing Zinio DRM https://mijailovic.net/2017/06/06/removing-zinio-drm/ 0 comments
- Uncovering a Malware Campaign Targeting the Logistics Industry - SCHUTZWERK https://www.schutzwerk.com/en/43/posts/covid19malware/ 0 comments
- Decrypting Eazfuscator.NET encrypted symbol names - Silent Signal Techblog https://blog.silentsignal.eu/2019/05/10/decrypting-eazfuscator-net-encrypted-symbol-names/ 0 comments
Linked pages
- GitHub - icedland/iced: Blazing fast and correct x86/x64 disassembler, assembler, decoder, encoder for Rust, .NET, Java, Python, Lua https://github.com/0xd4d/iced 22 comments
- GitHub - dotnet/roslyn: The Roslyn .NET compiler provides C# and Visual Basic languages with rich code analysis APIs. https://github.com/dotnet/roslyn 21 comments
Related searches:
Search whole site: site:github.com
Search title: GitHub - dnSpy/dnSpy: .NET debugger and assembly editor
See how to search.