0xb0bb / pwndraLinks
A collection of pwn/CTF related utilities for Ghidra
☆682Updated 10 months ago
Alternatives and similar repositories for pwndra
Users that are interested in pwndra are comparing it to the libraries listed below
Sorting:
- Use angr in Ghidra☆593Updated 11 months ago
- Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.☆490Updated 4 years ago
- ☆688Updated 3 months ago
- A Binary Ninja plugin for vulnerability research.☆294Updated 10 months ago
- gdbghidra - a visual bridge between a GDB session and GHIDRA☆321Updated 5 years ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆688Updated 2 months ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆386Updated 2 years ago
- pwninit - automate starting binary exploit challenges☆954Updated 11 months ago
- Using Intel's PIN tool to solve CTF problems☆500Updated 5 years ago
- repository for kernel exploit practice☆402Updated 5 years ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆509Updated last month
- IDA Pro's FindCrypt ported to Ghidra, with an updated and customizable signature database☆540Updated 2 years ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆615Updated 6 months ago
- The official angr GUI.☆1,012Updated this week
- Dark theme installer for Ghidra☆584Updated 2 years ago
- Scripts for the Ghidra software reverse engineering suite.☆1,091Updated 4 years ago
- Ghidra Analysis Enhancer 🐉☆300Updated 5 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆512Updated last year
- Apply IDA FLIRT signatures for Ghidra☆203Updated 5 years ago
- ☆164Updated 2 years ago
- Plugin for Ghidra to assist reversing Golang binaries☆330Updated 4 years ago
- A realtime assembler/disassembler (formerly known as disasm.ninja)☆296Updated 2 years ago
- Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.☆456Updated 3 years ago
- A reversing plugin for cross-decompiler collaboration, built on git.☆648Updated 2 weeks ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,353Updated 5 months ago
- A Ghidra script to save small patches back to the executable file☆225Updated 4 years ago
- The FLARE team's open-source extension to add Python 3 scripting to Ghidra.☆745Updated last year
- A thorough library database to assist with binary exploitation tasks.☆198Updated 2 years ago
- An updated collection of resources targeting browser-exploitation.☆817Updated 4 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,132Updated last year