alephsecurity / pyba2
☆16Updated 5 years ago
Alternatives and similar repositories for pyba2:
Users that are interested in pyba2 are comparing it to the libraries listed below
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆52Updated 5 years ago
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆37Updated 4 years ago
- Plugins for IDA Pro and Hex-Rays☆40Updated 6 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago
- Toshiba MeP-c4 for Ghidra☆22Updated 5 years ago
- ARMv7 architecture plugin☆40Updated 11 months ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Updated 6 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- ☆26Updated 6 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- Use Ghidra Structs in Python☆28Updated 3 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 5 years ago
- ☆30Updated 4 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- Bootloader research tools (very much a work in progress)☆37Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆40Updated 5 years ago
- REIL translation library☆36Updated 8 years ago
- ☆15Updated 5 years ago
- Some Ghidra scripts to automate my reverse-engineering tasks☆19Updated 3 years ago
- QuickPatch: A patching tool☆13Updated 5 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- Evaluation of two binary mutation engines based on ddisasm and rev.ng☆19Updated 2 years ago
- Abstract library to generate angr states from a debugger state☆59Updated 4 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- A debugger / emulator for Ghidra☆14Updated 5 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆28Updated 3 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago
- ☆18Updated 6 years ago
- ☆13Updated 8 years ago