a1ext / ida-embed-arch-disasmView external linksLinks
Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database
☆27Dec 27, 2021Updated 4 years ago
Alternatives and similar repositories for ida-embed-arch-disasm
Users that are interested in ida-embed-arch-disasm are comparing it to the libraries listed below
Sorting:
- DEPRECATED avatar-panda repository; please use https://github.com/panda-re/panda☆13Mar 19, 2021Updated 4 years ago
- Capstone Engine bindings on PHP 7.0+☆12Sep 22, 2022Updated 3 years ago
- ☆17Oct 5, 2020Updated 5 years ago
- gnu gcov like tool☆12Jun 18, 2015Updated 10 years ago
- ☆14Feb 14, 2018Updated 8 years ago
- Bootloader research tools (very much a work in progress)☆37Apr 5, 2019Updated 6 years ago
- ☆15Jan 24, 2016Updated 10 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- dll that hooks various uwp interfaces for debugging and reverse engineering☆23Nov 28, 2018Updated 7 years ago
- scripts, snippets etc.☆24Jul 17, 2025Updated 6 months ago
- Some python scripts are used to export userdata from huge idb(ida's database),ida 7.0 support only☆21Oct 18, 2018Updated 7 years ago
- PIITracker: Automatic Tracking of Personally Identifiable Information in Windows☆20Apr 1, 2018Updated 7 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- modify binary Portable Executable to hook its export functions☆67Jan 13, 2019Updated 7 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- A version of AFL tailored for Driller's use in analyzing CGC binaries.☆80Mar 20, 2017Updated 8 years ago
- ☆89May 9, 2019Updated 6 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- deprecated☆46Mar 20, 2019Updated 6 years ago
- Similarity Analysis to Defeat Malware Compiler Variations☆25Oct 3, 2017Updated 8 years ago
- ☆27Oct 19, 2018Updated 7 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- ☆23May 11, 2017Updated 8 years ago
- Plugin demonstrating how to link with Qt. CURRENTLY OUTDATED, UPDATE SOON☆29Jun 29, 2023Updated 2 years ago
- z3 scripts and ctf challenge solutions.☆24Dec 21, 2022Updated 3 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Jun 16, 2015Updated 10 years ago
- ☆27May 4, 2018Updated 7 years ago
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- A PlantsVsZombies.NET randomizer mod☆12Nov 3, 2022Updated 3 years ago
- Programmatic disassembly and patching☆69Dec 30, 2016Updated 9 years ago
- Windows Hypervisor Platform client☆31Jun 13, 2018Updated 7 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Dec 20, 2018Updated 7 years ago
- Automatically rebuild Import Address Table for dumped PE file. With python bindings!☆121Jan 25, 2019Updated 7 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 5 years ago
- ☆27May 29, 2015Updated 10 years ago