Vector35 / sample_plugin
Sample Binary Ninja Plugin
☆21Updated last year
Alternatives and similar repositories for sample_plugin:
Users that are interested in sample_plugin are comparing it to the libraries listed below
- IDA Database Importer plugin for Binary Ninja☆37Updated 6 months ago
- IDA (sort of) headless☆23Updated last year
- ☆14Updated 2 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Interface GDB-GEF with Binary Ninja☆58Updated 3 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- ☆33Updated 2 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆34Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Kernel Cache Decryption for iOS☆14Updated 3 years ago
- ☆18Updated 3 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 7 years ago
- IDA plugin displaying the P-Code for the current function☆65Updated last year
- Files for my solution to the SSTIC 2021 challenge☆15Updated 3 years ago
- Signature libraries for Binary Ninja☆14Updated 5 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆57Updated 2 years ago
- ☆30Updated 4 months ago
- Binary Ninja plugin to clean up some common obfuscation techniques.☆19Updated 4 years ago
- Create and use macros in IDA's CLIs☆64Updated last year
- ☆12Updated 2 years ago
- My conference presentations and publications☆26Updated 3 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆27Updated 4 years ago
- keynote I gave at GreHack 2019☆18Updated 5 years ago