hugsy / ida-headlessLinks
IDA (sort of) headless
☆26Updated last year
Alternatives and similar repositories for ida-headless
Users that are interested in ida-headless are comparing it to the libraries listed below
Sorting:
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 3 years ago
- ☆10Updated 4 years ago
- ☆41Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆31Updated 3 years ago
- PoC for House of Husk Exploit☆13Updated 5 years ago
- IDA Database Importer plugin for Binary Ninja☆37Updated last year
- ☆14Updated 2 years ago
- Full chain Chrome 71.0.3578.98 exploit☆19Updated 4 years ago
- IDA plugin displaying the P-Code for the current function☆67Updated last year
- Raw IDA Kernel API for IDAPython☆34Updated 3 years ago
- This is an IDA plugin to recover class information from C++ binary.☆18Updated 5 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆38Updated 2 years ago
- ☆33Updated 5 months ago
- Dice CTF 2022 breach write-up☆15Updated 3 years ago
- Dark+ Theme☆49Updated last year
- ☆19Updated 3 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆33Updated 4 years ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Updated 8 months ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Updated last year
- ☆19Updated 3 years ago
- ☆27Updated last month
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 4 years ago
- ☆35Updated 4 years ago
- An IDA processor for eBPF bytecode☆67Updated 10 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆34Updated 4 years ago
- ☆14Updated 5 years ago
- ☆82Updated 2 years ago
- Bring libfuzzer to Unicorn☆26Updated 3 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago