☆25Mar 22, 2023Updated 2 years ago
Alternatives and similar repositories for idapython-cheatsheet
Users that are interested in idapython-cheatsheet are comparing it to the libraries listed below
Sorting:
- ☆23Oct 9, 2024Updated last year
- Make the Windows API in Ghidra easy to read and informative.☆28Jan 10, 2022Updated 4 years ago
- LLVM-based ROP obfuscated compiler☆13Mar 24, 2022Updated 3 years ago
- Python library and CLI for listing and downloading Apple's updates for macOS (Secruity updates, CommandLineTools, OS Upgrades and etc...)☆20Oct 19, 2025Updated 4 months ago
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Dec 31, 2021Updated 4 years ago
- ☆11Sep 20, 2021Updated 4 years ago
- コンテナ内から安全にダークウェブをクローリングするための環境☆14Jan 17, 2023Updated 3 years ago
- User-friendly reference finder in IDA☆39Dec 17, 2022Updated 3 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- ☆18May 25, 2022Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆18Jun 24, 2023Updated 2 years ago
- セキュリティ・キャンプ全国大会2020 オンライン B8講義資料☆18Nov 28, 2020Updated 5 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆33Sep 21, 2019Updated 6 years ago
- A simple ida python script to find .data ptr☆59May 6, 2023Updated 2 years ago
- ☆253Jan 11, 2023Updated 3 years ago
- IDA7.6/IDA7.7/IDA8.1 + Python3 下,Go 在各常见 CPU架构(ARM/MIPS/x86/x64)下, ELF 文件的符号恢复脚本。已适配 Go1.2/Go1.16/Go1.18/Go1.20☆33Oct 12, 2024Updated last year
- Binary ninja plugin for python compiled bytecode (pyc) disassembly☆32Mar 3, 2024Updated last year
- Software installation scripts for macOS systems that allows you to setup a Virtual Machine (VM) for reverse engineering macOS malware☆38Jun 26, 2025Updated 8 months ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- obpo backend server written by golang☆33Jul 28, 2023Updated 2 years ago
- Demo repository showcasing how to use reusable workflows to build artifact attestations☆14Feb 16, 2026Updated last week
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago
- FTL Rust Demangler is a command-line tool for demangling symbol names that are mangled with the Rust convention. It takes a mangled symbo…☆42May 19, 2023Updated 2 years ago
- typescript autocomplete plugin for frida's java warpper☆39Feb 18, 2024Updated 2 years ago
- frida 持久化☆44Updated this week
- Past presentation materials☆10Jul 10, 2018Updated 7 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Code and files specific to the AWS Certified Security - Specialty Exam Prep course☆10Jan 16, 2024Updated 2 years ago
- MCP for reverse engineering☆47Mar 30, 2025Updated 11 months ago
- A Python framework that uses machine learning algorithms to implement the metadata recovery attack against obfuscated programs.☆11Jul 25, 2016Updated 9 years ago
- ☆11Feb 19, 2023Updated 3 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- ☆13May 17, 2020Updated 5 years ago
- Google maps http and ip lookup for ida pro☆14Mar 10, 2019Updated 6 years ago
- PANDA-powered tracing engine for tenet☆11Apr 7, 2022Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Auto Move Your Cursor to the Focused Window while You Alt-Tab or Touchboard for Windows☆10Dec 11, 2024Updated last year
- A free runtime modification library.☆13Feb 10, 2020Updated 6 years ago