flounderK / ghidra_scriptsLinks
☆12Updated last month
Alternatives and similar repositories for ghidra_scripts
Users that are interested in ghidra_scripts are comparing it to the libraries listed below
Sorting:
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last month
- ☆33Updated last month
- A collection of scripts to aid in reverse engineering and exploit development.☆24Updated 4 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 5 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- A library for patching ELFs☆61Updated 5 years ago
- Interface GDB-GEF with Binary Ninja☆59Updated 4 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Updated 3 years ago
- ☆36Updated 5 years ago
- Code snippets for Binary Ninja's Python API☆30Updated 4 years ago
- USB device fuzzing on Android Phone☆34Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- ☆85Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆65Updated 3 years ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆129Updated 2 years ago
- A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can b…☆42Updated 2 weeks ago
- A multi-platform fuzzer for poking at userland binaries, network clients and servers☆69Updated 3 weeks ago
- Research related☆89Updated 3 years ago
- ☆32Updated 2 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 11 months ago
- ☆21Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Updated 3 years ago
- bash script and modified java program to headlessly use ghidra's decompiler☆58Updated 3 years ago
- ☆38Updated last year
- ☆55Updated 3 years ago
- ☆31Updated 2 months ago
- REVerse ENGineering Environment☆63Updated last year
- IDA plugin that displays the P-code for the current function☆72Updated last month