h4sh5 / ghidra-headless-decompileLinks
bash script and modified java program to headlessly use ghidra's decompiler
☆58Updated 3 years ago
Alternatives and similar repositories for ghidra-headless-decompile
Users that are interested in ghidra-headless-decompile are comparing it to the libraries listed below
Sorting:
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Updated 4 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated 2 years ago
- IDA plugin displaying the P-Code for the current function☆67Updated 2 years ago
- Repo for fuzzing projects☆46Updated 5 years ago
- ☆76Updated 4 years ago
- Binary Ninja plugin for visualizing coverage over time☆25Updated 3 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆56Updated 6 years ago
- WINAFL for blackbox in-memory fuzzing (PIN)☆47Updated 6 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ☆83Updated 3 years ago
- A tool to inject C code into ELF64 binaries☆30Updated 4 years ago
- VSCode dark theme for IDA 7.3☆28Updated 4 years ago
- A fast execution trace symbolizer for Windows.☆129Updated last year
- Helper script for Linux kernel disassemble or debugging with IDA Pro on VMware + GDB stub (including some symbols helpers)☆37Updated 2 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- Multi-tool reverse engineering collaboration solution.☆142Updated last year
- Interface GDB-GEF with Binary Ninja☆58Updated 4 years ago
- Breaking Secure Boot with SMM☆41Updated 3 years ago
- Banana Fuzzer ~ modulable, loop based, poc gen, code cov, platform agnostic, race oriented☆59Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 4 years ago
- A library for patching ELFs☆57Updated 4 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆80Updated 2 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆70Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆41Updated 6 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆44Updated last year
- A fast, multithreaded, ROP-gadget semantics analyzer.☆51Updated 4 years ago
- Python based angr plug in for IDA Pro.☆35Updated 7 years ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 4 months ago
- IDA SIG files for multiarch uClibc library☆38Updated 7 years ago