Invoke-RE / binja-lattice-mcp
Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.
☆31Updated this week
Alternatives and similar repositories for binja-lattice-mcp:
Users that are interested in binja-lattice-mcp are comparing it to the libraries listed below
- Remove WPP calls from hexrays decompiled code☆47Updated last month
- LLDB based debugger for Linux Kernel☆24Updated last month
- Playing with LLVM passes☆36Updated last year
- ☆25Updated 6 months ago
- Custom instruction length for hex-rays☆18Updated 4 months ago
- Disassembler for Zeus VM custom instruction set☆28Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆47Updated last month
- MCP for reverse engineering☆33Updated last month
- IDA plugin to aid with Swift reverse engineering☆34Updated 6 months ago
- A journal for $6,000 Riot Vanguard bounty.☆63Updated last year
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆18Updated 6 months ago
- Yet another LLVM-based obfuscator☆113Updated 8 months ago
- ☆24Updated 7 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆34Updated last year
- ☆18Updated 2 months ago
- Report and exploit of CVE-2024-21305.☆34Updated last year
- Bump your ida python script automatically!☆24Updated 2 weeks ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 2 years ago
- A simple but useful project maybe help you reverse Windows.☆36Updated last year
- A KISS Rust crate to parse Windows kernel crash-dumps created by Windows & its debugger.☆34Updated 3 months ago
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆78Updated 2 months ago
- Implementation of sllvm obfuscator☆66Updated 2 years ago
- Inlay hints for hex-rays☆60Updated 3 weeks ago
- A few examples of how to trap virtual memory access on Windows.☆30Updated 4 months ago
- IFL - Interactive Functions List (plugin for Binary Ninja)☆23Updated 9 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- Rule Engine for Dynamic Malware Analysis and Research☆23Updated 2 weeks ago
- llvm powered deobfuscation of a vm-based protection☆35Updated 2 weeks ago
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆46Updated 3 years ago