danielplohmann / idascope
An IDA Pro extension for easier (malware) reverse engineering
☆114Updated 2 years ago
Alternatives and similar repositories for idascope:
Users that are interested in idascope are comparing it to the libraries listed below
- Analyses in IDA/Hex-Rays☆81Updated 2 years ago
- IDA python plugin to scan binary with Yara rules☆172Updated last year
- ☆226Updated 2 years ago
- A collection of my IDA plugins☆134Updated 4 years ago
- Hexrays decompiler plugin that colorizes and filters the decompiler's output based on regular expressions☆133Updated last year
- Control-flow-flattening and string deobfuscator☆150Updated 3 years ago
- ☆72Updated 3 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 2 years ago
- ☆104Updated 3 years ago
- Two IDAPython Scripts help you to reconstruct Microsoft COM (Component Object Model) Code☆182Updated 4 years ago
- Bindings for Microsoft WinDBG TTD☆220Updated last year
- An IDA Plugin that help analyzing module that use COM☆209Updated last year
- IDA plugin to pinpoint obfuscated code☆140Updated 3 years ago
- Static unpacker for FinSpy VM☆100Updated 3 years ago
- IDA plugin for quickly copying disassembly as encoded hex bytes☆61Updated 3 years ago
- Malware dynamic instrumentation tool based on frida framework☆105Updated 4 years ago
- Small programs and scripts that do not require their own repositories☆138Updated 3 years ago
- IDA plugins and scripts for analyzing register usage frame☆181Updated last year
- ☆71Updated last year
- IDA Pro resources, scripts, and configurations☆111Updated last year
- Parsers for custom malware formats ("Funky malware formats")☆96Updated 3 years ago
- Yara rule making tool (IDA Pro & Binary Ninja & Cutter & Ghidra Plugin)☆232Updated 6 months ago
- Local server for IDA Lumina feature☆191Updated 4 years ago
- Hyper-V Research is trendy now☆178Updated last year
- Collects extended function properties from IDA Pro databases☆93Updated 4 years ago
- IDA Pro plugin to show functions in a tree view☆115Updated 4 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆125Updated 3 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 10 months ago
- Devirtualize Virtual Calls☆115Updated 3 years ago
- ☆100Updated 10 months ago