SnowGirls / deflatLinks
☆123Updated 7 years ago
Alternatives and similar repositories for deflat
Users that are interested in deflat are comparing it to the libraries listed below
Sorting:
- 0x401 Team二进制方向逆向辅助分析工具专题培训☆81Updated 4 years ago
- ☆286Updated 2 years ago
- Use angr to deflat the flat control flow.☆24Updated 6 years ago
- My toy llvm pass☆138Updated 3 years ago
- Muti-threading version of Finger☆32Updated last year
- a deflat script using unicorn engine☆43Updated 3 years ago
- IDA_Signsrch in Python☆107Updated 5 years ago
- IDA VSCode-like skin.☆76Updated 2 months ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Updated 2 years ago
- Official Capstone Disassembly Engine API documentation☆126Updated 4 years ago
- 用于存放IDA的研究资料和文档☆95Updated 4 years ago
- A tool for recognizing function symbol☆485Updated last year
- idc脚本, IDAPython脚本, ida插件等.☆23Updated 3 years ago
- Official Unicorn CPU emulator framework API documentation☆269Updated 2 years ago
- We developed the HarmonyOS NEXT decompilation tool named arkdecompiler, which takes Panda Binary File as input, parses Panda Bytecode, an…☆139Updated this week
- cracker for the llvm-fla-obfuscator☆24Updated 9 years ago
- break ollvm.☆114Updated 8 months ago
- Deobfuscate OLLVM Bogus Control Flow via angr☆68Updated 4 years ago
- Make your IDA Lazy!☆294Updated last year
- use angr to deobfuscation☆702Updated last year
- Rizzo plugin by devttys0, ported to IDA 7☆55Updated 7 years ago
- Angr CTF From introduction to mastery☆153Updated 7 months ago
- ☆202Updated 2 months ago
- 基于angr的污点分析引擎☆42Updated 6 years ago
- ollvm de-obfuscator☆63Updated 4 years ago
- hook android so and debug it easily with no need to run the apk!!☆19Updated 5 years ago
- 010Editor template for .abc (Open/HarmonyOS Ark Bytecode) files☆43Updated last year
- 移动安全相关的一些面经和知识整理☆26Updated 4 years ago
- D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode.☆63Updated 4 years ago
- 笔者在一款基于LLVM编译器架构的retdec开源反编译器工具的基础上,融合了klee符号执行工具,通过符号执行(Symbolic Execution)引擎动态模拟反编译后的llvm的ir(中间指令集)运行源程序的方法,插桩所有的对x86指令集的thiscall类型函数对t…☆223Updated 3 years ago