iij / idapython-cheatsheetLinks
☆23Updated 2 years ago
Alternatives and similar repositories for idapython-cheatsheet
Users that are interested in idapython-cheatsheet are comparing it to the libraries listed below
Sorting:
- Automatically identify and extract potential anti-debugging techniques used by malware.☆20Updated 6 months ago
- Make the Windows API in Ghidra easy to read and informative.☆27Updated 3 years ago
- Security Camp 2021 & GCC 2022☆110Updated 3 years ago
- LLVM-based ROP obfuscated compiler☆14Updated 3 years ago
- Not Another Code Injection Toolkit☆16Updated 3 years ago
- cross-architecture static library detector for IoT malware☆36Updated last year
- Automatically identify and extract potential anti-debugging techniques used by malware.☆157Updated 6 months ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- ☆73Updated 11 months ago
- Memory tampering tool for security assessment☆23Updated 6 months ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 3 years ago
- ☆72Updated 3 years ago
- ☆50Updated 2 years ago
- Convenience routines for working with the Unicorn emulator in Python☆24Updated 4 months ago
- UnpacMe IDA Byte Search☆28Updated last year
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 2 years ago
- Modified python version of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to unflatten Emotet'S Control Flow Flattening☆25Updated 3 years ago
- Analyses in IDA/Hex-Rays☆83Updated 2 years ago
- Control-flow-flattening and string deobfuscator☆152Updated 3 years ago
- Towards Generic Deobfuscation of Windows API Calls☆50Updated 6 years ago
- Yet another rule generator for Yara☆29Updated 4 years ago
- Unicorn PE function runner☆57Updated 7 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆41Updated 5 months ago
- Windows Crypto API compatible decryption/encryption for python☆49Updated 2 years ago
- ☆104Updated 3 years ago
- ☆28Updated 2 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Updated 4 years ago
- IDA plugin to pinpoint obfuscated code☆140Updated 3 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago