StarCrossPortal / ghidracraft
Ghidracraft is part of the bincraft project collections, a forked version of Ghidra which mixes in our flavor. Checkout ghidracraft-book for more!
☆86Updated 3 years ago
Alternatives and similar repositories for ghidracraft:
Users that are interested in ghidracraft are comparing it to the libraries listed below
- ☆81Updated 3 years ago
- Material and examples for a presentation on static binary analysis.☆40Updated 3 years ago
- Tool that converts All of libc to signatures for IDA Pro FLIRT Plugin. and utility make sig with FLAIR easily☆163Updated 2 years ago
- AFL bindings for Unicorn-Engine☆71Updated 3 weeks ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 5 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆79Updated last year
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆120Updated last year
- angr's exploration technique to perform taint analysis☆55Updated 4 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- Static Binary Instrumentation☆119Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated last year
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- Rizzo plugin by devttys0, ported to IDA 7☆56Updated 6 years ago
- sleigh craft!☆249Updated 3 years ago
- ☆99Updated 3 years ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆169Updated 2 years ago
- Display Hex-Rays Microcode☆235Updated 2 years ago
- A Ghidra headless analyzer tailored for Qt binary analysis☆51Updated 3 months ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆46Updated 2 years ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 8 years ago
- A code-searching/completion tool, for IDA APIs☆81Updated last week
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆84Updated last year
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- A Universal MCU Firmware Emulator for Dynamic Analysis without Any Hardware Dependence.☆133Updated last year
- A /proc/mem IDA loader to snapshot a running process☆160Updated 2 years ago
- ☆80Updated 2 years ago
- A data-flow-guided fuzzer☆111Updated last year
- FANS: Fuzzing Android Native System Services☆246Updated 4 years ago