foundryzero / ghidra-deep-linksLinks
A cross-platform plugin for Ghidra that provides deep linking support. This enables the generation of clickable disas:// links that can be included in 3rd party applications.
☆42Updated 8 months ago
Alternatives and similar repositories for ghidra-deep-links
Users that are interested in ghidra-deep-links are comparing it to the libraries listed below
Sorting:
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆91Updated this week
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 10 months ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆81Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- ☆39Updated 4 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆81Updated 2 weeks ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆33Updated 2 years ago
- ☆84Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated 2 years ago
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆35Updated 3 years ago
- Xyntia, the black-box deobfuscator☆84Updated last month
- weggli ruleset scanner for source code and binaries☆35Updated 2 weeks ago
- ☆68Updated 9 months ago
- Pishi is a code coverage tool like kcov for macOS.☆73Updated 7 months ago
- radius is a fast binary emulation and symbolic execution framework using radare2☆46Updated 3 years ago
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆121Updated last week
- ☆79Updated 3 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated 6 months ago
- An IDA plugin that can be used to partially synchronize IDBs between different users reversing the same binaries☆136Updated 10 months ago
- breaking decompilers☆55Updated 6 months ago
- WTF Snapshot fuzzing of macOS targets☆97Updated last year
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆50Updated last year
- ☆79Updated 11 months ago
- ☆51Updated last year
- binary ninja related code☆37Updated 8 months ago
- ☆30Updated 2 years ago
- IDA Pro script to find interesting syscalls and patterns in binaries☆22Updated last year
- ☆55Updated 3 years ago
- A Python API to VarBERT, a BERT based model for suggesting variable names in decompiled code.☆55Updated last year