byeongal / PEAnalyserView external linksLinks
PEAnalyser is an open source PE file analysis tool.
☆11Oct 26, 2020Updated 5 years ago
Alternatives and similar repositories for PEAnalyser
Users that are interested in PEAnalyser are comparing it to the libraries listed below
Sorting:
- Binary analysis. Capstone+Keystone+Unicorn = static and dynamic binary analysis☆12Oct 11, 2019Updated 6 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- Modular binary injection framework☆18Jan 6, 2020Updated 6 years ago
- ☆16Jan 27, 2019Updated 7 years ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆26Jan 16, 2019Updated 7 years ago
- Lightweight C++11 library with a tidy API, built using Capstone, to facilitate creating and tracking function-level and instruction-level…☆45Jul 25, 2025Updated 6 months ago
- Java Library wrapper for Ghidra Headless Analysis + Java Samples☆21Nov 20, 2025Updated 2 months ago
- Import an x64dbg database into a Ghidra Project☆22Aug 22, 2019Updated 6 years ago
- An ARM disassembler written in Python that also generates pseudo-code☆15Jan 6, 2017Updated 9 years ago
- Screen recorder for x64dbg, for recording screen while debugging.☆11Jul 27, 2016Updated 9 years ago
- (fast) Capstone Go bindings☆11Aug 8, 2018Updated 7 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- Qiling Framework Documentation☆18Mar 9, 2025Updated 11 months ago
- EmojiTools for c++☆12Jul 22, 2019Updated 6 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- A tool to inject C code into ELF64 binaries☆30May 25, 2021Updated 4 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- An emulator for the ARM core in the Nintendo Wii, implemented with Unicorn☆14May 18, 2021Updated 4 years ago
- Pharo bindings to the Unicorn machine code simulation library☆15Mar 18, 2025Updated 10 months ago
- Dracula inspired theme for Ghidra☆12Dec 3, 2019Updated 6 years ago
- Command line utility for APK fingerprinting☆13Jan 10, 2023Updated 3 years ago
- ☆14Aug 24, 2019Updated 6 years ago
- A Unicorn based emulator to deobfuscate Equation Group string XOR obfuscation☆33Sep 26, 2018Updated 7 years ago
- A simple Windows x86-32 debugger☆10May 24, 2016Updated 9 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Mar 21, 2023Updated 2 years ago
- A proof of concept for obfuscating an x86_64 ELF executable without binary lifting. Done as a challenge project.☆18Feb 12, 2019Updated 7 years ago
- Ghidra's Sleigh syntax highligther☆12Oct 18, 2019Updated 6 years ago
- A gameclient hooking framework to aid debuging☆16Nov 27, 2019Updated 6 years ago
- Alternative Unicorn bindings because the original did not work and I don't know F#.☆14Feb 17, 2024Updated last year
- fork自https://github.com/DoubleLabyrinth/navicat-keygen, 修改兼容低版本的c++☆15May 21, 2019Updated 6 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- A Ghidra processor module for the EFI Byte Code (EBC)☆35Jun 20, 2020Updated 5 years ago
- (ARM Thumb) Re-Assembler utility for reverse engineering☆17May 6, 2018Updated 7 years ago
- ☆20Mar 13, 2018Updated 7 years ago
- scripts, snippets etc.☆24Jul 17, 2025Updated 6 months ago
- ☆17Feb 15, 2022Updated 3 years ago