Assisting Go Analysis and Reversing
☆98Nov 13, 2025Updated 4 months ago
Alternatives and similar repositories for agar
Users that are interested in agar are comparing it to the libraries listed below
Sorting:
- Generate Go bindings for shared C libraries.☆15Jul 13, 2024Updated last year
- Rust symbol recovery tool☆81Feb 19, 2026Updated last month
- Custom instruction length for hex-rays☆28Jan 17, 2026Updated 2 months ago
- ☆27Jul 18, 2024Updated last year
- IDA plugin helping reverse-engineering rust binaries☆33Jul 31, 2024Updated last year
- Symbol Recovery Tool for Nuitka Binaries☆84Dec 25, 2024Updated last year
- This tool can be useful for solving some reversing challenges in CTFs events.☆15Nov 1, 2021Updated 4 years ago
- VMLifter 是一个基于指令执行轨迹的语义提升工具,专注于值依赖驱动的程序语义重建。☆45Mar 9, 2026Updated last week
- Terminal-based IDA disassembly, microcode and pseudocode dumper☆44Mar 11, 2026Updated last week
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- CoRCTF 2025 - CoRPhone: Android Kernel Pwn☆52Sep 3, 2025Updated 6 months ago
- ☆56Jan 17, 2026Updated 2 months ago
- Programming oriented AWD framework☆16Feb 11, 2020Updated 6 years ago
- Go fastcall analysis for ida decompiler☆46Jun 25, 2025Updated 8 months ago
- Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.☆12Feb 2, 2023Updated 3 years ago
- iOS crash log symbolication tool for jailbroken devices☆19Jan 30, 2026Updated last month
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Patchestry is a binary patching framework built with MLIR and Ghidra.☆81Updated this week
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆53Updated this week
- 个人使用的 IDA Pro Plugins 集合☆40Jan 20, 2026Updated 2 months ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- Instrumenting a binary without source code to bypass anti-debug checks☆38Sep 25, 2021Updated 4 years ago
- Bindiff_for_IDA9 (support 9.0rc1 9.0 9.1)☆94May 23, 2025Updated 9 months ago
- Make You Happy!☆264Mar 7, 2026Updated last week
- A cross-platform C++ framework for building Windows shellcode☆163Mar 4, 2026Updated 2 weeks ago
- Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection…☆21Dec 1, 2021Updated 4 years ago
- eyuyan image rebuild tools source code☆13Sep 1, 2016Updated 9 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Agentic malware analysis environment with MCP-connected disassemblers, RE tooling, and structured workflows for Claude Code and Codex CLI…☆135Updated this week
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- ☆17Sep 25, 2024Updated last year
- An intuitive query API for IDA Pro☆167Oct 20, 2025Updated 5 months ago
- ☆57Jul 2, 2025Updated 8 months ago
- ☆16Feb 27, 2026Updated 3 weeks ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆52Jan 19, 2026Updated 2 months ago
- Utilities scripts and Python module to facilitate executing idapython scripts in IDA.☆30Updated this week