Automatically identify and extract potential anti-debugging techniques used by malware.
☆28Nov 20, 2024Updated last year
Alternatives and similar repositories for Ghidra_AntiDebugSeeker
Users that are interested in Ghidra_AntiDebugSeeker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GHARF is an efficient support framework for Red Team exercises that applies the concept of CI/CD☆38Jul 14, 2025Updated 9 months ago
- A Ghidra headless analyzer tailored for Qt binary analysis☆75Oct 7, 2024Updated last year
- ☆10Jan 3, 2023Updated 3 years ago
- The GhidraLookup plugin aims to help user lookup documentations of Win API functions.☆17Aug 5, 2021Updated 4 years ago
- A Ghidra-based tool designed to analyze binaries and identify the ssl_log_secret() function if present.☆20Mar 4, 2026Updated 2 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- セキュリティキャンプ 2022 Y4 RISC-V CPU自作ゼミ 講義資料☆29Aug 13, 2024Updated last year
- Automatically identify and extract potential anti-debugging techniques used by malware.☆172Nov 22, 2024Updated last year
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Mar 6, 2026Updated 2 months ago
- Restoring room images from virtual background images☆44Oct 8, 2021Updated 4 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆133Nov 25, 2025Updated 5 months ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 8 years ago
- トホホ…☆12Jan 24, 2023Updated 3 years ago
- Detection Engineering Tools☆26Apr 29, 2026Updated last week
- Large text file viewer to handle > 10GB text file reading, purely written in Rust☆53Mar 22, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Exploits for YARA 3.7.1 & 3.8.1☆37Dec 20, 2018Updated 7 years ago
- ☆12Sep 29, 2021Updated 4 years ago
- FindCrypt for Ghidra written in Python☆26May 20, 2020Updated 5 years ago
- malware analysis scripts for Ghidra☆84Aug 7, 2023Updated 2 years ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- ☆16Dec 14, 2017Updated 8 years ago
- A toolkit for conducting multiple static binary analysis based on Ghidra.☆25May 1, 2025Updated last year
- CVE-2025-59501 POC code☆26Nov 20, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆27Jul 26, 2024Updated last year
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Solutions to HackSysExtremeVulnerableDriver challenges though my following of @FuzzySecurity's tutorials plus futher explanations where n…☆23Aug 25, 2017Updated 8 years ago
- IoM defualt mal package☆10Feb 22, 2026Updated 2 months ago
- Analyze Golang with Ghidra☆236Mar 17, 2026Updated last month
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆111Apr 24, 2026Updated last week
- A solution for llvmvm in MRCTF2022☆11Apr 27, 2022Updated 4 years ago
- ☆15Apr 4, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16Jun 1, 2018Updated 7 years ago
- NASM macOS translation of the source code listings distributed with the Art of 64-bit Assembly Language book.☆20Nov 10, 2025Updated 5 months ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- A x86/x64 class library that can be injected into unmanaged processes☆11Sep 6, 2020Updated 5 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- SIMPLE ESP32 SOFTWARE OVERCLOCK EXPERIMENT☆17Oct 20, 2021Updated 4 years ago
- Ghidra analysis plugin to locate cryptographic constants☆296Jun 13, 2023Updated 2 years ago