flounderK / ghidra_scripts
☆11Updated 2 weeks ago
Alternatives and similar repositories for ghidra_scripts:
Users that are interested in ghidra_scripts are comparing it to the libraries listed below
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆14Updated 2 years ago
- ☆30Updated 3 months ago
- Sample Binary Ninja Plugin☆20Updated last year
- Export a binary from ghidra to emulate with unicorn☆26Updated 5 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated 2 weeks ago
- IDA (sort of) headless☆22Updated last year
- ☆27Updated last year
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆30Updated 4 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- Fork of Synacktiv's private Lumina server☆21Updated 3 years ago
- ☆10Updated 3 years ago
- Here I store my proof of concepts☆13Updated 5 months ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆15Updated 2 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- ☆30Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- A debugger / emulator for Ghidra☆14Updated 5 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated 5 months ago
- ☆74Updated 2 years ago
- IDA plugin that resolves PPL calls to the actual underlying PPL function.☆57Updated last year
- MacOS kernel memory leak (4 bytes)☆30Updated 4 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated last year
- A useful IDA Notepad plug-in that can completely replace IDA’s native Notepad window.☆20Updated 2 months ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- JS modules for Frida based tools to add code coverage to your instrumentation scripts.☆25Updated 6 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆46Updated 5 years ago
- A collection of scripts to aid in reverse engineering and exploit development.☆23Updated 3 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago