h311d1n3r / Arion
A high-performance C++ framework for emulating executable binaries
☆87Updated this week
Alternatives and similar repositories for Arion:
Users that are interested in Arion are comparing it to the libraries listed below
- Rust symbol recovery tool☆44Updated 3 weeks ago
- ☆99Updated last week
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆116Updated 5 months ago
- ☆88Updated 2 months ago
- Modular and extensible library for Virtual Machine Introspection☆91Updated 2 weeks ago
- Obfuscator-llvm Control Flow Flattening Deobfuscator☆105Updated this week
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆134Updated 7 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆73Updated 5 months ago
- ☆199Updated last year
- An intuitive query API for IDA Pro☆155Updated 3 weeks ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆109Updated last year
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆151Updated last year
- Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib☆147Updated last week
- Inlay hints for hex-rays☆58Updated this week
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆78Updated 8 months ago
- ☆60Updated 2 weeks ago
- Framework to automate working with AST in IDA Pro☆69Updated last year
- RISC-V Virtual Machine☆216Updated last month
- LLVM based static binary analysis framework☆237Updated 2 weeks ago
- Bump your ida python script automatically! (wip)☆23Updated 6 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆122Updated last month
- Rust library for lifting raw binary data to LLVM IR☆47Updated last week
- A curated list of awesome resources related to anti virtualization techniques☆44Updated this week
- ☆47Updated last month
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆114Updated 11 months ago
- A Pythonic Ghidra standard library☆165Updated this week
- compile-time control flow obfuscation using mba☆181Updated last year
- An x86-64 Code Virtualizer☆251Updated 6 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆152Updated last month
- Binary Ninja plugin for interacting with the OALabs HashDB service☆18Updated 5 months ago