leommxj / ghidra_cskyView external linksLinks
☆28Dec 17, 2025Updated 2 months ago
Alternatives and similar repositories for ghidra_csky
Users that are interested in ghidra_csky are comparing it to the libraries listed below
Sorting:
- ☆12Mar 28, 2022Updated 3 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- ☆40Feb 3, 2026Updated last week
- ReCopilot IDA☆49Jan 12, 2026Updated last month
- ☆27Apr 28, 2023Updated 2 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- L8 R8:Cortex-A53 LTE SoC☆27Nov 16, 2019Updated 6 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- A Simple DLL Forward for Fucking IDA 9.0, which removed ida64.dll from beta3.☆14Sep 19, 2024Updated last year
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- ☆32Apr 14, 2023Updated 2 years ago
- ☆10Sep 1, 2021Updated 4 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆34Feb 4, 2025Updated last year
- VTable dumper for IDA 7.7+☆17Jun 19, 2025Updated 7 months ago
- ☆12Apr 3, 2022Updated 3 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- A fully compatible replacement of Windows NT NtCreateLowBoxToken syscall - precisely restored from reverse engineering☆42Jun 10, 2025Updated 8 months ago
- CTF pwn工具,一个快速搭建任何版本环境的工具、使用chroot具备环境隔离、ida自动加载DWARF、被调试程序输入输出重定向等功能☆16Dec 16, 2020Updated 5 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- Patch for the emulation of Octeon MIPS64 in QEMU☆15Feb 2, 2018Updated 8 years ago
- ☆20Aug 27, 2024Updated last year
- A in-the-wild V8 type confusion bug.☆29Aug 8, 2025Updated 6 months ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 3 years ago
- ☆16Mar 26, 2024Updated last year
- Run TrustZone TAs outside the secure world.☆17Oct 14, 2025Updated 4 months ago
- Script to setup pwn environment with Docker☆47Jan 10, 2026Updated last month
- ☆22Oct 18, 2023Updated 2 years ago
- ☆20May 27, 2020Updated 5 years ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- A Lua 5.1 Bytecode Decompiler written in Rust☆19Jan 29, 2019Updated 7 years ago
- r3kapig website☆34Nov 19, 2025Updated 2 months ago
- Dark+ Theme☆50May 17, 2024Updated last year
- ☆51Mar 23, 2018Updated 7 years ago
- ☆53Jan 17, 2026Updated last month
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 9 years ago
- IDA (sort of) headless☆27Feb 17, 2024Updated last year