enovella / ida2ghidra-kbLinks
IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating
☆90Updated 6 years ago
Alternatives and similar repositories for ida2ghidra-kb
Users that are interested in ida2ghidra-kb are comparing it to the libraries listed below
Sorting:
- Packages for IDA Pro (written in python but supports all)☆132Updated 4 years ago
- A code-searching/completion tool, for IDA APIs☆83Updated 7 months ago
- Ghidra Emulates Functions☆55Updated 4 years ago
- IDAPyHelper is a script for the Interactive Disassembler that helps writing IDAPython scripts and plugins.☆173Updated 2 years ago
- ☆154Updated 6 years ago
- ☆198Updated 3 years ago
- Tool that converts All of libc to signatures for IDA Pro FLIRT Plugin. and utility make sig with FLAIR easily☆169Updated 2 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆126Updated last year
- IDA command palette & more (Ctrl+Shift+P, Ctrl+P)☆162Updated 10 months ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆86Updated 5 years ago
- Local server for IDA Lumina feature☆193Updated 4 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆56Updated 7 months ago
- Display Hex-Rays Microcode☆243Updated 2 years ago
- Various debugging tools such as %DumpObjects for v8☆55Updated 6 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆211Updated 3 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 5 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆280Updated 5 years ago
- Coverage-guided binary fuzzing powered by Frida Stalker☆183Updated 4 years ago
- ☆198Updated 2 years ago
- A Minimalist Instruction Extender for the ARM architecture and IDA Pro☆201Updated last year
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- ☆89Updated 6 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 5 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Updated 6 years ago
- WCTF 2019 challenge☆100Updated 6 years ago
- Generates `.pyi` type stubs for the entire Ghidra API☆151Updated 6 months ago
- Snapshot fuzzing with KVM and LibAFL☆96Updated 3 years ago
- PoC of modifying HexRays AST☆261Updated 5 years ago
- ☆138Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago