HexRaysSA / ida-cyberchefLinks
A Qt-based CyberChef interface designed for malware analysis workflows, particularly in IDA Pro
☆37Updated this week
Alternatives and similar repositories for ida-cyberchef
Users that are interested in ida-cyberchef are comparing it to the libraries listed below
Sorting:
- Easy-to-use IDA plugin for code emulation☆42Updated 3 weeks ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 3 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆62Updated last year
- llvm powered deobfuscation of a vm-based protection☆43Updated 6 months ago
- ☆33Updated last year
- A devirtualization engine for Themida.☆101Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆95Updated 2 weeks ago
- Lightweight PDB symbol parser and resolver☆26Updated 11 months ago
- Native opaque predicate cleaner plugin for Binary Ninja☆44Updated this week
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆54Updated 5 months ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆33Updated last year
- IDA-names automatically renames pseudocode windows with the current function name.☆59Updated 2 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆36Updated 2 years ago
- IDA Map File Symbol Renamer☆22Updated 6 months ago
- ☆12Updated 8 months ago
- VM devirtualization PoC based on AsmJit and llvm☆112Updated 4 years ago
- A x86_64 software emulator☆149Updated last month
- ☆110Updated 2 months ago
- ☆42Updated last year
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆117Updated last year
- devirtualization vmprotect☆62Updated 2 years ago
- IDA Plugin that fills in missing indirect CALL & JMP target information☆137Updated 9 months ago
- ☆22Updated 2 years ago
- x86-64 user mode emulation using Zydis☆69Updated last month
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆47Updated this week
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆83Updated last year
- Python bindings for the Icicle emulator.☆40Updated this week
- Binary Ninja plugin for automating VMProtect analysis☆63Updated 2 years ago
- ☆62Updated 2 years ago
- Code virtualizer