DSTCyber / safe-deobsLinks
A static deobfuscator for JavaScript Malware
☆13Updated 5 years ago
Alternatives and similar repositories for safe-deobs
Users that are interested in safe-deobs are comparing it to the libraries listed below
Sorting:
- A plugin to integrate the Frida dynamic instrumentation toolkit into Binary Ninja.☆62Updated 5 years ago
- A collection of my Ghidra scripts☆100Updated 2 years ago
- ☆31Updated 5 years ago
- Some tee/trustzone helper stuff☆56Updated 6 years ago
- RESTful API for Unipacker (https://github.com/unipacker/unipacker)☆15Updated 4 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- Some 'one-line' frida api to avoid code recycling here and there☆28Updated 6 years ago
- Simple proto parser with a gui☆19Updated 4 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Updated 6 years ago
- gopclntab finder and analyzer for Radare2☆21Updated 5 years ago
- Hacky scripts to fixup stack strings in Ghidra's decompiler.☆36Updated 3 years ago
- Exploiting the Semantic Gap in Trusted Execution Environments☆57Updated 6 years ago
- A very minimalist smali emulator that could be used to "decrypt" obfuscated strings☆103Updated 8 years ago
- "Reversing WebAssembly Module 101" Workshop (NorthSec 2019, hack.lu 2019)☆22Updated 5 years ago
- Scope VM: Javascript Virtual Machine☆39Updated 7 years ago
- 🕵️ The crappy, magical string Java/Android decrypter☆11Updated 5 years ago
- Fuzzing framework to target native components of android applications☆20Updated 3 years ago
- ☆68Updated 7 months ago
- Ghidra plugin to communicate with radare2☆68Updated last month
- My binary ninja plugin that encapsulate frida, unicorn, capstone and keystone☆73Updated 7 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Updated 8 years ago
- Tool based on @gaasedelen's lighthouse frida tool modified for capturing coverage of Android executables.☆19Updated 2 years ago
- Java Library wrapper for Ghidra Headless Analysis + Java Samples☆21Updated last month
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Updated 4 years ago
- A smali emulator.☆25Updated 7 years ago
- bash script and modified java program to headlessly use ghidra's decompiler☆58Updated 3 years ago
- Ghidra Wasm plugin with disassembly and decompilation support☆65Updated 2 years ago
- Binary Ninja Syscall Annotator☆46Updated 3 years ago
- Plugin for Frida in Binary Ninja☆27Updated 4 years ago
- IDAPython plugin for finding Xrefs from a function☆48Updated 9 years ago