kukfa / bindbg
Binary Ninja plugin that syncs WinDbg to Binary Ninja
☆47Updated 6 years ago
Alternatives and similar repositories for bindbg:
Users that are interested in bindbg are comparing it to the libraries listed below
- ☆33Updated 9 years ago
- Control Flow Guard Teleportation demo☆23Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆40Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 6 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 5 years ago
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Updated 6 years ago
- ☆39Updated 3 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆37Updated 7 years ago
- ☆50Updated 7 years ago
- A fuzz job for ClamAV☆31Updated 8 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31Updated 9 years ago
- Automatically exported from code.google.com/p/ioctlbf☆16Updated 9 years ago
- Windows SMEP Bypass U=S☆37Updated 8 years ago
- Public repository for HEVD exploits☆20Updated 6 years ago
- My conference presentations and publications☆26Updated 2 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 7 years ago
- ☆33Updated 8 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆42Updated last year
- POC viruses I have created to demo some ideas☆59Updated 4 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- ☆28Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆29Updated 6 years ago