danielplohmann / smda
SMDA is a minimalist recursive disassembler library that is optimized for accurate Control Flow Graph (CFG) recovery from memory dumps.
☆229Updated last week
Alternatives and similar repositories for smda:
Users that are interested in smda are comparing it to the libraries listed below
- grap: define and match graph patterns within binaries☆154Updated 2 years ago
- ☆223Updated 2 years ago
- IDA Pro plugin to assist with complex graphs☆314Updated last year
- Bindings for Microsoft WinDBG TTD☆215Updated last year
- Automatically generate AV byte signatures from sets of similar binaries.☆263Updated 2 months ago
- Windows API tracer for malware (oldname: unitracer)☆117Updated 7 years ago
- Yara rule making tool (IDA Pro & Binary Ninja & Cutter & Ghidra Plugin)☆227Updated 4 months ago
- idahunt is a framework to analyze binaries with IDA Pro and hunt for things in IDA Pro☆384Updated last year
- Robust Automated Malware Unpacker☆84Updated last year
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆192Updated this week
- This project aims at simplifying Windows API import recovery on arbitrary memory dumps☆247Updated last year
- HexRays ctree visualization plugin☆393Updated 5 months ago
- IDA python plugin to scan binary with Yara rules☆172Updated last year
- A plugin based on IDAPython for a functional DWIM interface. Current development against most recent IDA is in the "persistence-refactor"…☆321Updated this week
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆123Updated 3 years ago
- ☆176Updated 6 years ago
- scripts/plugins for IDA Pro☆169Updated last month
- Control-flow-flattening and string deobfuscator☆149Updated 3 years ago
- IDA Signsrch☆155Updated 9 years ago
- Toolkit for enriching and speeding up static malware analysis☆166Updated 3 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆217Updated 4 years ago
- Static unpacker for FinSpy VM☆99Updated 3 years ago
- Devirtualize Virtual Calls☆115Updated 2 years ago
- Manipulation, canonicalization and identification of mixed boolean-arithmetic symbolic expressions☆308Updated last year
- A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research☆453Updated last year
- PoC of modifying HexRays AST☆254Updated 5 years ago
- Generating YARA rules based on binary code☆205Updated 3 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆269Updated 4 years ago
- ☆193Updated 2 years ago
- PEDA-like debugger UI for WinDbg☆202Updated 10 months ago