d1nn3r / RECLASSIFYLinks
This is an IDA plugin to recover class information from C++ binary.
☆19Updated 5 years ago
Alternatives and similar repositories for RECLASSIFY
Users that are interested in RECLASSIFY are comparing it to the libraries listed below
Sorting:
- Raw IDA Kernel API for IDAPython☆34Updated 3 years ago
- Static Binary Instrumentation☆121Updated 4 years ago
- IDAPython / IDC tips and tricks☆38Updated 3 years ago
- ☆43Updated 3 years ago
- IDA (sort of) headless☆26Updated last year
- nanoMIPS IDA plugin☆68Updated 4 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆38Updated 2 years ago
- An IDA processor for eBPF bytecode☆68Updated last year
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Updated 3 years ago
- ☆61Updated 3 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- IDA plugin displaying the P-Code for the current function☆67Updated 2 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Updated 3 years ago
- Dark+ Theme☆49Updated last year
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Updated 4 years ago
- ☆13Updated 3 years ago
- Alternative API for IDA / Hex-Rays☆75Updated 2 years ago
- Toy LLVM obfuscator pass☆73Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- ☆10Updated 4 years ago
- IDA SDK tech demo☆39Updated 5 years ago
- angr源码分析☆33Updated 5 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆86Updated 4 years ago
- Mirrors for my talk materials☆45Updated 3 weeks ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆31Updated 3 years ago
- 一个将 vmnote 指令集重编译成 x64 指令集的脚本,并且可以用 IDA 进行分析。☆15Updated 4 years ago
- Fork of Synacktiv's private Lumina server☆21Updated 3 years ago
- IDA plugin: fold decomplied code☆11Updated 3 years ago
- 动态二进制插桩框架DynamoRIO通过将程序代码进行反复插桩(Instrumentation)执行构建了源程序代码与操纵代码之间的桥梁,使DynamoRIO的客户端编写者能够在更高的 层面上驾驭原有的程序代码.虽然程序的载体还是被编译成原生的汇编指令集执行,但是不管是原生代…☆34Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆48Updated 8 years ago