MalwareTech / MSDIA-x64
Enable Microsoft PDB support in Ghidra without installing Visual Studio
☆38Updated 5 years ago
Alternatives and similar repositories for MSDIA-x64:
Users that are interested in MSDIA-x64 are comparing it to the libraries listed below
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 6 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated last year
- kernel exploitation helper class☆76Updated 8 years ago
- ☆36Updated 5 years ago
- ANBU (Automatic New Binary Unpacker) a tool for me to learn about PIN and about algorithms for generic unpacking.☆89Updated 5 years ago
- Driver Initial Reconnaissance Tool☆121Updated 5 years ago
- SentinelOne's KeRnel Exploits Advanced Mitigations☆52Updated 6 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 3 years ago
- ViDi Visual Disassembler (experimental)☆76Updated 2 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆33Updated 9 years ago
- Parsers for custom malware formats ("Funky malware formats")☆93Updated 3 years ago
- crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks☆108Updated 5 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34Updated 5 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- pyGoRE - Python library for analyzing Go binaries☆64Updated 3 years ago
- ☆67Updated last year
- Binary Ninja Posters☆35Updated 4 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 5 years ago
- Integrate Ghidra's decompiler as an Ida plugin, this version has nice syntax highlighting, comments and other cool features.☆51Updated 3 years ago
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- ☆79Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- Official x64dbg plugin for Binary Ninja☆76Updated 3 weeks ago
- Function signature matching and signature generation plugin for Binary Ninja☆70Updated 5 months ago
- ☆33Updated 3 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- Transfer analysis data between Binary Ninja and IDA☆127Updated 4 months ago