Java integration for Hex-Rays IDA Pro
☆26Feb 15, 2017Updated 9 years ago
Alternatives and similar repositories for idajava
Users that are interested in idajava are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- Plugin for IDA Pro to convert assembler to LLVM IR☆20Nov 15, 2016Updated 9 years ago
- CGEN with support for generating IDA Pro IDP modules☆30Dec 28, 2015Updated 10 years ago
- IDA loader plugin for Qualcomm Bootloader Stages☆40Jan 23, 2014Updated 12 years ago
- BlackHat Asia 2017 talk☆34Mar 30, 2017Updated 8 years ago
- ☆40Jan 10, 2012Updated 14 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Apr 19, 2018Updated 7 years ago
- IDA Pro plugin to make functions tree view☆31Dec 25, 2018Updated 7 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- idb2pat plugin, fixed to work with IDA 6.2☆23Oct 8, 2011Updated 14 years ago
- Rapid prototyping HTTP toolkit based on Netty. Supports container-style jars, multi-hosting, REST primitives.☆19Jul 14, 2013Updated 12 years ago
- Tool to analyze 64-bit binaries with 32-bit Hex-Rays Decompiler☆79Jan 11, 2015Updated 11 years ago
- Blog series about Pwn Adventure 3: http://blog.keyidentity.com/tag/pwnadventure/☆38Oct 19, 2017Updated 8 years ago
- IDA recompiler☆31Dec 8, 2014Updated 11 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Useful Plugin for IDA to Trace Function Call Tree☆27Jan 4, 2018Updated 8 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- ☆49Mar 1, 2022Updated 4 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- The androidvulnerabilities.org website and source data☆21Jul 7, 2020Updated 5 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- File view plugin for listing ue4 loaded file assets☆15Feb 7, 2023Updated 3 years ago
- PHP Opcode Analyser☆14Mar 2, 2013Updated 13 years ago
- Google maps http and ip lookup for ida pro☆14Mar 10, 2019Updated 7 years ago
- BinSourcerer☆92Mar 1, 2022Updated 4 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆12Mar 21, 2016Updated 10 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Android 脱壳☆14Mar 23, 2022Updated 4 years ago
- Python script which extracts procedures from IDA Win32 LST files and converts them to correctly dynamically linked compilable Visual C++ …☆28Jul 10, 2009Updated 16 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆27Jan 18, 2023Updated 3 years ago
- PoC binary file of FakeID,with some source code☆46Aug 7, 2014Updated 11 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- Transplant adore rootkit for Android platform.☆41Aug 27, 2014Updated 11 years ago
- IDA binary differ. Since code.google.com/p/patchdiff2/ seemed abandoned, I did the obvious thing…☆66Apr 9, 2015Updated 10 years ago