LAC-Japan / Ghidra_AntiDebugSeekerLinks
Automatically identify and extract potential anti-debugging techniques used by malware.
☆23Updated 8 months ago
Alternatives and similar repositories for Ghidra_AntiDebugSeeker
Users that are interested in Ghidra_AntiDebugSeeker are comparing it to the libraries listed below
Sorting:
- Make the Windows API in Ghidra easy to read and informative.☆28Updated 3 years ago
- ☆23Updated 2 years ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆84Updated 2 months ago
- Native Python3 bindings for @horsicq's Detect-It-Easy☆72Updated 2 months ago
- ☆51Updated 2 years ago
- Automatically identify and extract potential anti-debugging techniques used by malware.☆162Updated 8 months ago
- UnpacMe IDA Byte Search☆29Updated last year
- Convenience routines for working with the Unicorn emulator in Python☆26Updated 6 months ago
- Writeups for CTF challenges☆31Updated last year
- FindCrypt for Ghidra written in Python☆26Updated 5 years ago
- ☆74Updated last year
- Binary Ninja plugin to analyze and simplify obfuscated code☆162Updated last month
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆72Updated last year
- ☆82Updated 2 years ago
- Repository for the code snippets from the AllThingsIDA video channel☆111Updated 2 months ago
- Parse .NET executable files.☆77Updated last month
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆166Updated last week
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 3 years ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 2 years ago
- ☆31Updated 3 years ago
- ☆106Updated 2 years ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆62Updated 3 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆42Updated 7 months ago
- Modified python version of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to unflatten Emotet'S Control Flow Flattening☆26Updated 3 years ago
- Notes on using the Python bindings for the Unicorn Engine☆78Updated 5 years ago
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆53Updated 3 weeks ago
- ☆203Updated last year
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- Control-flow-flattening and string deobfuscator☆155Updated 3 years ago
- An IDA plugin that can be used to partially synchronize IDBs between different users reversing the same binaries☆131Updated 7 months ago