IDA Python scripts
☆42Apr 11, 2025Updated 10 months ago
Alternatives and similar repositories for IDAPython
Users that are interested in IDAPython are comparing it to the libraries listed below
Sorting:
- Configuration Extractors for Malware☆124Apr 23, 2025Updated 10 months ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- ☆35Jan 13, 2026Updated last month
- Repository of Yara Rules☆139Feb 16, 2026Updated last week
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- ☆27Jan 17, 2026Updated last month
- ConfuserEx2 String Decryptor & Full Deobfuscation Guide☆99Aug 5, 2024Updated last year
- IDA Map File Symbol Renamer☆24Apr 1, 2025Updated 10 months ago
- IOCs and notes related to malware☆27Jul 7, 2025Updated 7 months ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆18Dec 3, 2025Updated 2 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- CTF source code(s) from multiple websites.☆10May 4, 2025Updated 9 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆31Jan 17, 2026Updated last month
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- IDA 9.X Function String Associate Plugin☆21Feb 19, 2026Updated last week
- ☆13Jan 22, 2025Updated last year
- IDA plugin: fold decomplied code☆11Nov 26, 2021Updated 4 years ago
- 免杀木马样本☆103Oct 11, 2025Updated 4 months ago
- Select any exported function in a dll as the new dll's entry point.☆81Oct 25, 2024Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 4 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 8 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated 3 weeks ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback func…☆88Jun 24, 2022Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 3 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- Export IDA microcode to BinExport format so that you can use BinDiff to diff microcodes☆12Sep 21, 2024Updated last year
- Archive of leaked Equation Group materials☆21Aug 17, 2016Updated 9 years ago
- A simple macOS debugger detection trick☆19Apr 7, 2025Updated 10 months ago