enovella / ida2ghidra-kbLinks
IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating
☆90Updated 6 years ago
Alternatives and similar repositories for ida2ghidra-kb
Users that are interested in ida2ghidra-kb are comparing it to the libraries listed below
Sorting:
- A code-searching/completion tool, for IDA APIs☆83Updated 6 months ago
- ☆196Updated 3 years ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- Packages for IDA Pro (written in python but supports all)☆133Updated 4 years ago
- IDAPyHelper is a script for the Interactive Disassembler that helps writing IDAPython scripts and plugins.☆172Updated 2 years ago
- ☆154Updated 6 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆126Updated last year
- Local server for IDA Lumina feature☆193Updated 4 years ago
- IDA command palette & more (Ctrl+Shift+P, Ctrl+P)☆162Updated 9 months ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 5 years ago
- Generates `.pyi` type stubs for the entire Ghidra API☆151Updated 5 months ago
- Tool that converts All of libc to signatures for IDA Pro FLIRT Plugin. and utility make sig with FLAIR easily☆169Updated 2 years ago
- WCTF 2019 challenge☆100Updated 6 years ago
- ☆198Updated 2 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆86Updated 5 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆201Updated 11 months ago
- ☆89Updated 6 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 5 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆279Updated 5 years ago
- Various debugging tools such as %DumpObjects for v8☆55Updated 6 years ago
- ☆249Updated 4 years ago
- Display Hex-Rays Microcode☆240Updated 2 years ago
- ☆187Updated 4 months ago
- Fuzzing library written in/for python.☆85Updated 5 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆211Updated 2 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- ☆137Updated 4 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆122Updated 8 years ago