galoget / ghidra-headless-scripts
Ghidra Headless Scripts for Automated Analysis (Decompilation and Disassembly)
☆70Updated 2 years ago
Alternatives and similar repositories for ghidra-headless-scripts:
Users that are interested in ghidra-headless-scripts are comparing it to the libraries listed below
- Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.☆200Updated 5 months ago
- A collection of resources/tools and analyses for the angr binary analysis framework.☆173Updated 2 years ago
- Ghidra scripts for malware analysis☆92Updated last year
- ☆101Updated 2 years ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆126Updated 4 months ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆218Updated 4 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆107Updated 4 months ago
- ☆315Updated 9 months ago
- Generates `.pyi` type stubs for the entire Ghidra API☆151Updated last month
- Run IDA scripts headlessly.☆140Updated 3 months ago
- Repository for the code snippets from the AllThingsIDA video channel☆101Updated 3 months ago
- Quokka: A Fast and Accurate Binary Exporter☆191Updated 3 weeks ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆194Updated this week
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆94Updated last week
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆616Updated 2 weeks ago
- Unofficial CMake build for Ghidra's C++ SLEIGH code☆151Updated last week
- Ghidra Extension to integrate BinDiff for function matching☆264Updated last month
- Native Pcode emulator☆286Updated 8 months ago
- Multi-tool reverse engineering collaboration solution.☆138Updated last year
- FLARE Team's Binary Navigator☆247Updated this week
- Control-flow-flattening and string deobfuscator☆148Updated 3 years ago
- ☆56Updated 3 months ago
- Use angr in Ghidra☆575Updated 8 months ago
- Hardening code obfuscation against automated attacks☆131Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆111Updated 3 weeks ago
- Programming productivity plugin for IDAPython and C++ development☆340Updated last week
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆163Updated 2 years ago
- Quarkslab Bindiffer but not only !☆199Updated 3 weeks ago
- Triton-based DSE library with loading and exploration capabilities (and more!)☆114Updated 3 months ago
- Ghidra analysis plugin to locate cryptographic constants☆257Updated last year