AGDCservices / Ghidra-ScriptsLinks
malware analysis scripts for Ghidra
☆83Updated 2 years ago
Alternatives and similar repositories for Ghidra-Scripts
Users that are interested in Ghidra-Scripts are comparing it to the libraries listed below
Sorting:
- LERN GHIDRA☆93Updated 5 months ago
- Ghidra scripts for malware analysis☆102Updated 2 years ago
- Notes on using the Python bindings for the Unicorn Engine☆80Updated 5 years ago
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆171Updated last week
- An IDA Pro extension for easier (malware) reverse engineering☆116Updated 3 years ago
- FindCrypt for Ghidra written in Python☆26Updated 5 years ago
- Writeups for CTF challenges☆35Updated 2 years ago
- Malware dynamic instrumentation tool based on frida framework☆110Updated 5 years ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆65Updated 4 years ago
- Analyses in IDA/Hex-Rays☆87Updated 2 years ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆127Updated 7 months ago
- Official x64dbg plugin for Binary Ninja☆85Updated last month
- ☆73Updated 2 years ago
- Code snips and notes☆140Updated 3 years ago
- Make your Ghidra Lazy!☆155Updated 5 years ago
- Repository for the code snippets from the AllThingsIDA video channel☆123Updated 3 months ago
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆160Updated 5 years ago
- API Logger for Windows Executables☆80Updated 5 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆128Updated 4 years ago
- How to retro theme your Ghidra☆35Updated 3 months ago
- Research notes☆130Updated last year
- Multi-tool reverse engineering collaboration solution.☆142Updated last year
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆135Updated 3 weeks ago
- Dataset of packed PE samples☆43Updated last week
- Robust Automated Malware Unpacker☆87Updated 2 years ago
- Devirtualize Virtual Calls☆115Updated 3 years ago
- Native Python3 bindings for @horsicq's Detect-It-Easy☆80Updated 8 months ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- ☆116Updated 3 years ago
- Set of antianalysis techniques found in malware☆133Updated 2 years ago