bkerler / ghidra_installer
Helper scripts to set up OpenJDK 11 and scale Ghidra for 4K on Ubuntu 18.04 / 18.10
☆116Updated 5 months ago
Related projects: ⓘ
- Ghidra scripts such as a RC4 decrypter, Yara search, stack string decoder, etc.☆157Updated 4 years ago
- DarkNight theme for Ghidra☆125Updated 3 years ago
- ☆106Updated 5 years ago
- PoC 2019-2215 exploit for S8/S8 active with DAC + SELinux + Knox/RKP bypass☆218Updated 4 years ago
- ☆217Updated last year
- Ghidra scripts for malware analysis☆84Updated 8 months ago
- Make your Ghidra Lazy!☆130Updated 4 years ago
- ☆215Updated last year
- ☆114Updated 3 weeks ago
- IDA plugins and scripts for analyzing register usage frame☆179Updated last year
- Docker image for building ghidra RE framework from source☆73Updated last year
- Frida-based general purpose fuzzer☆210Updated 4 years ago
- Binary code coverage visualizer plugin for Ghidra☆284Updated 2 months ago
- Ghidra Function ID dataset repository☆175Updated 4 years ago
- Research material and Proof-of-Concepts for Aleph Research Findings☆84Updated 2 years ago
- Code and exercises for a workshop on z3 and angr☆220Updated 3 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆179Updated 3 years ago
- Code Samples for the book "The Definite Guide to ARM Exploitation"☆48Updated 6 years ago
- Make ARM Shellcode Great Again☆60Updated 3 years ago
- ☆129Updated 3 years ago
- Binary Ninja Debugger Plugin☆141Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆221Updated 8 months ago
- A PCode Emulator for Ghidra.☆102Updated 3 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆74Updated 3 years ago
- Data Visualization Plugin for IDA Pro☆287Updated last year
- An IDA Pro extension for easier (malware) reverse engineering☆109Updated 2 years ago
- ☆89Updated 3 months ago
- A thorough library database to assist with binary exploitation tasks.☆195Updated 2 years ago
- ☆91Updated 4 years ago
- Exploitation on ARM-based Systems (Troopers18)☆146Updated 6 years ago