cmu-sei / kaiju
CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- please file tickets, bug reports, or pull requests at the upstream home in @CERTCC: https://github.com/certcc/kaiju
☆125Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for kaiju
- Ghidra scripts for malware analysis☆90Updated 9 months ago
- ☆115Updated last month
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆100Updated 2 months ago
- ☆100Updated last month
- Reverse engineering software using a full system simulator☆174Updated this week
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆98Updated 2 years ago
- A tool for firmware cartography☆139Updated 8 months ago
- Triton-based DSE library with loading and exploration capabilities (and more!)☆106Updated 2 weeks ago
- Robust Automated Malware Unpacker☆84Updated last year
- ☆180Updated last year
- ☆185Updated 3 years ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆86Updated 4 months ago
- Notes on using the Python bindings for the Unicorn Engine☆69Updated 4 years ago
- Build your emulation environment as needed☆64Updated 3 years ago
- ☆89Updated 4 months ago
- An IDA Pro extension for easier (malware) reverse engineering☆110Updated 2 years ago
- This project tries to provide additional Ghidra Version Tracking Correlators suitable for patch diffing.☆89Updated last year
- symbolic execution plugin for binary ninja☆249Updated 8 months ago
- ☆59Updated last month
- Bindings for Microsoft WinDBG TTD☆200Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆89Updated last month
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆230Updated this week
- A binary analysis framework written in Rust.☆162Updated last week
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆182Updated this week
- Binarly Vulnerability Research Advisories☆167Updated last month
- SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.☆224Updated 3 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆103Updated 5 months ago
- ☆306Updated 4 months ago
- ☆74Updated last month
- Multi-tool reverse engineering collaboration solution.☆134Updated 7 months ago