VDA-Labs / GHIDRA-ScriptsLinks
VDA Labs scripts for the GHIDRA reverse engineering toolset
☆29Updated 6 years ago
Alternatives and similar repositories for GHIDRA-Scripts
Users that are interested in GHIDRA-Scripts are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- ☆36Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- ☆43Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 6 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- ☆14Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- ☆17Updated 4 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆55Updated 8 years ago
- ☆53Updated 8 years ago
- API functions for Malware Research☆35Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Updated 11 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- RPCSniffer sniffs WINDOWS RPC messages in a given RPC server process.☆65Updated 10 years ago
- A Python tool to generate ROP chains☆64Updated 6 months ago
- ☆46Updated 6 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- ☆35Updated 9 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- Memory inspection REPL interface☆45Updated 7 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 3 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 6 years ago