batcain / idapython_scripts
☆15Updated last year
Alternatives and similar repositories for idapython_scripts:
Users that are interested in idapython_scripts are comparing it to the libraries listed below
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 2 years ago
- ☆25Updated 5 months ago
- Tools to bypass flawed SELinux policies using the init_module system call☆52Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆40Updated 3 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 2 years ago
- ☆28Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- A small tool to unmap PE memory dumps.☆11Updated last year
- javascript extension of windbg for hacker.☆15Updated last year
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- IDA plugin to deobfuscate emotet CFF☆17Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- Go fastcall analysis for ida decompiler☆31Updated last month
- Slides, recordings and materials of my public presentations, talks and workshops.☆77Updated this week
- ☆56Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Kernel Read Write Execute☆83Updated 7 months ago
- Hex-Rays Block Highlighter plugin for IDA to highlight if/for/do/switch/while blocks☆61Updated 2 years ago
- Diaphora Machine Learning tools and datasets☆20Updated 6 months ago
- Writeups for CTF challenges☆30Updated last year
- ☆22Updated 10 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆18Updated 2 weeks ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆31Updated 5 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- ☆32Updated last year
- Writeup and scripts for the 2021 malwarebytes crackme☆10Updated 3 years ago
- Currently proof-of-concept☆16Updated 3 years ago
- ☆71Updated last year
- How to retro theme your Ghidra☆35Updated 5 months ago