ea / xfg_analyzerLinks
A Binary Ninja plugin that uses bruteforced XFG hashes to recover precise function prototypes
☆15Updated last year
Alternatives and similar repositories for xfg_analyzer
Users that are interested in xfg_analyzer are comparing it to the libraries listed below
Sorting:
- Extract data of TTD trace file to a minidump☆28Updated last year
- SPI flash read MitM attack PoC☆38Updated 3 years ago
- ☆31Updated 3 years ago
- Python bindings for BochsCPU☆36Updated last week
- ☆28Updated 5 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Updated last year
- A few examples of how to trap virtual memory access on Windows.☆30Updated 5 months ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- IFL - Interactive Functions List (plugin for Binary Ninja)☆23Updated 10 months ago
- clone of armadillo patched for windows☆47Updated 7 months ago
- javascript extension of windbg for hacker.☆15Updated last year
- ☆45Updated 4 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆65Updated last year
- ☆19Updated last month
- binary ninja related code☆35Updated 2 months ago
- Custom instruction length for hex-rays☆18Updated 5 months ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- ☆50Updated 3 months ago
- UnpacMe IDA Byte Search☆28Updated last year
- An extremely experimental Binary Ninja importer for the type layout information emitted by the -Zprint-type-sizes flag of the Rust compil…☆36Updated last year
- ☆13Updated 2 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- Different tools for Microsoft Hyper-V researching☆57Updated last year
- Helper idapython code for reversing kmdf drivers☆72Updated 2 years ago
- ☆25Updated 7 months ago
- PyKD DLLs for x86 and x64 platforms☆17Updated last year
- Convenience routines for working with the Unicorn emulator in Python☆25Updated 4 months ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆60Updated 9 months ago
- Semantic strings based on tree-sitter☆15Updated 3 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆93Updated 7 months ago