huku- / recoverView external linksLinks
Recover compile-units from stripped binary executables
☆59Jan 6, 2026Updated last month
Alternatives and similar repositories for recover
Users that are interested in recover are comparing it to the libraries listed below
Sorting:
- ☆53Jan 17, 2026Updated last month
- llvm powered deobfuscation of a vm-based protection☆46Apr 18, 2025Updated 9 months ago
- PDB Rewriting Rust Library☆27Apr 26, 2024Updated last year
- Mixed Boolean Arithmetic Simplification using E-Graphs☆24May 1, 2025Updated 9 months ago
- ☆27Jan 17, 2026Updated last month
- Retypd plugin for Ghidra reverse engineering framework from NSA☆27Jul 6, 2023Updated 2 years ago
- Tutorial for writing an LLVM backend☆30May 19, 2025Updated 8 months ago
- Common format for transferring and applying function information across binary analysis tools☆59Nov 5, 2025Updated 3 months ago
- ast pattern matching with automated structure recovery for hex-rays decompiler☆26Jan 10, 2026Updated last month
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 2 years ago
- Develop macOS apps on Windows with seamless cross-platform tools.☆15Jun 5, 2025Updated 8 months ago
- ☆31Jan 17, 2026Updated last month
- Mixed Boolean-Arithmetic in Rust for WebAssembly☆30Jun 14, 2025Updated 8 months ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 2 months ago
- breaking decompilers☆56May 9, 2025Updated 9 months ago
- ☆13Jun 20, 2022Updated 3 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Jun 27, 2022Updated 3 years ago
- LLVM Graph View for VSCode☆39Mar 25, 2025Updated 10 months ago
- A utility library to bridge llvm and mlir gaps.☆14Jan 8, 2025Updated last year
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- Ctrl+P plugin for Ghidra: quick search and command palette.☆36Dec 29, 2024Updated last year
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- C++11 RAII memory patcher and function hooking thing☆35Oct 5, 2016Updated 9 years ago
- fundamental traits to describe an architecture in the yaxpeax project☆17Mar 1, 2025Updated 11 months ago
- setup Ghidra environment for GitHub Actions☆17Jun 19, 2023Updated 2 years ago
- Slides and materials for the talk Reconstructing Rust Types: A Practical Guide for Reverse Engineers at RE//verse 2025, presented on Febr…☆20May 23, 2025Updated 8 months ago
- Plugin for ida pro that copies RVA under cursor to clipboard.☆16Jul 28, 2023Updated 2 years ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆109Jan 18, 2026Updated 3 weeks ago
- LLVM Pass to save Reverse Engineers from Automation☆118Mar 28, 2025Updated 10 months ago
- A simple plugin for working with Swift Strings, optimized Swift Strings, and Swift Arrays during the reverse engineering of iOS binaries …☆22Jun 5, 2025Updated 8 months ago
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆41Jan 20, 2026Updated 3 weeks ago
- An obfuscator bases on llvm for multiple language and platform☆19Jun 28, 2017Updated 8 years ago
- x64dbg typeparsing plugin with Windows types☆70Aug 29, 2025Updated 5 months ago
- ☆50Dec 17, 2025Updated 2 months ago
- Ghidra Sleight (PCode) parsing library in Rust.☆44Dec 29, 2024Updated last year
- A kexec-based bootloader☆27Updated this week
- Moved to: https://codeberg.org/TSRBerry/nxo64☆20Jan 19, 2026Updated 3 weeks ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆53Dec 30, 2025Updated last month