VDA-Labs / GHIDRA-ScriptsLinks
VDA Labs scripts for the GHIDRA reverse engineering toolset
☆29Updated 6 years ago
Alternatives and similar repositories for GHIDRA-Scripts
Users that are interested in GHIDRA-Scripts are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin that syncs WinDbg to Binary Ninja☆47Updated 7 years ago
- Flare-On solutions☆36Updated 5 years ago
- ☆36Updated 5 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 6 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆69Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Control Flow Guard Teleportation demo☆23Updated 6 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- API functions for Malware Research☆35Updated 6 years ago
- ☆43Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- 802.15.4 Fuzzer☆21Updated 6 years ago
- A set of scripts for a radare-based malware code analysis workflow☆67Updated 6 years ago
- ☆91Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- bunch of random stuff☆21Updated 5 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆56Updated 8 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- ☆32Updated last year
- A Python tool to generate ROP chains☆64Updated 7 months ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Updated 8 years ago
- Export disassemblies into Protocol Buffers☆21Updated 2 months ago
- My conference presentations and publications☆26Updated 3 years ago
- Memory inspection REPL interface☆45Updated 7 years ago