AllsafeCyberSecurity / headless_scriptsLinks
Headless Scripts for Ghidra's Headless Analyzer written in Python
☆32Updated 6 years ago
Alternatives and similar repositories for headless_scripts
Users that are interested in headless_scripts are comparing it to the libraries listed below
Sorting:
- Some Ghidra scripts to automate my reverse-engineering tasks☆21Updated 4 years ago
- Nampa - FLIRT for (binary) ninjas☆95Updated 9 months ago
- My scripts for Ghidra.☆25Updated 2 years ago
- A PCode Emulator for Ghidra.☆109Updated 4 years ago
- Function signature matching and signature generation plugin for Binary Ninja☆75Updated last year
- Port of the binary diffing library, diaphora, for radare2 and mariadb☆51Updated 2 years ago
- FindCrypt for Ghidra written in Python☆26Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Build your emulation environment as needed☆65Updated 4 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Use Ghidra Structs in Python☆29Updated 4 years ago
- Ghidra Emulates Functions☆55Updated 4 years ago
- ☆76Updated 4 years ago
- A Ghidra extension for scripting with GraalVM languages, including Javascript, Python3, R, and Ruby.☆61Updated 4 years ago
- Binary Ninja Syscall Annotator☆45Updated 3 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 4 years ago
- Ghidra RE scripts☆38Updated 4 years ago
- Multi-tool reverse engineering collaboration solution.☆140Updated last year
- Binary Ninja Plugin for Generating Callgraphs☆17Updated 3 months ago
- a few Ghidra scripts for dumping PCode data☆50Updated 6 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- Symbolic Simplification with PAttern Matching☆106Updated 8 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆125Updated last year
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 2 years ago
- Hacky scripts to fixup stack strings in Ghidra's decompiler.☆36Updated 3 years ago
- Some basics on how to get started with Ghdira Scripting☆24Updated 5 years ago
- A Ghidra plugin for locating object file boundaries.☆125Updated last week
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 4 years ago
- ☆39Updated 5 years ago