evilsocket / ghidra-reLinks
An AI agent to use Ghidra with any AI.
☆23Updated 10 months ago
Alternatives and similar repositories for ghidra-re
Users that are interested in ghidra-re are comparing it to the libraries listed below
Sorting:
- Dalvik bytecode emulator for Android static analysis | String decryption | Multi-DEX | No Android runtime required☆78Updated last month
- ☆63Updated last year
- Deepextract : extracts details about activities, services, and broadcast receivers, including their intent actions, custom URL schemes an…☆11Updated last year
- Tools to bypass flawed SELinux policies using the init_module system call☆57Updated 2 years ago
- A modular and extendable Python tool for emulating simple SMALI code.☆93Updated last year
- Proof-of-concept code for Android APEX key reuse vulnerability☆103Updated 2 years ago
- Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable x86_64 Linux kernels v5.10.x.☆267Updated last month
- AndroidDriveSignity is a Python utility designed to bypass driver signature verification in Android kernel(ARMv8.3), facilitating the loa…☆65Updated last year
- Katalina is like Unicorn but for Dalvik bytecode. It provides an environment that can execute Android bytecode one instruction at a time.☆160Updated 2 years ago
- Dynamic injection tool for Linux/Android☆197Updated last year
- MCP stdio server for radare2☆137Updated 2 weeks ago
- Getting better stacks and backtraces in Frida☆61Updated 2 months ago
- Android Overlay Hijack☆29Updated last year
- Type diagram plugin for JADX decompiler☆74Updated last month
- Binary Ninja plugin to analyze and simplify obfuscated code☆237Updated 4 months ago
- mobile reverse engineering framework☆92Updated this week
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Updated 2 months ago
- Yet Another Unix Injector with support for Android/Android Emulator i686/x64/arm/aarch64☆60Updated last week
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆37Updated 3 years ago
- exploits for CVE-2024-20017☆140Updated last year
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆39Updated 9 months ago
- A Python script that dynamically attaches Frida to any debuggable Android process over JDWP, enabling runtime instrumentation without roo…☆148Updated last month
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆24Updated 2 weeks ago
- ☆59Updated 2 years ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆19Updated last year
- A headless, extendable, multi-session, IDA Pro MCP framework.☆139Updated 3 weeks ago
- ☆137Updated 2 years ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆121Updated this week
- Remote library injection into Android processes, then hooking via various methods☆64Updated 2 months ago
- Another™ MCP Server for Binary Ninja with superpower 🥵☆31Updated 8 months ago