mahmoudimus / ida-taskrLinks
IDA Taskr is a pure Python library for IDA Pro related parallel computing. It lets you use the power of Qt (built-in to IDA!) and Python's powerful multiprocessing and asyncio systems to quickly process computationally intensive tasks without freezing IDA Pro. Oh, and it's super fast too.
☆30Updated last month
Alternatives and similar repositories for ida-taskr
Users that are interested in ida-taskr are comparing it to the libraries listed below
Sorting:
- dynamic binary instrumentation, analysis, and patching framework☆99Updated this week
- llvm powered deobfuscation of a vm-based protection☆44Updated 8 months ago
- Simple anti-instrumentation with EFLAGS.AC☆18Updated 8 months ago
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆62Updated last year
- Lightweight PDB symbol parser and resolver☆28Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 4 months ago
- Python bindings for the Icicle emulator.☆40Updated last month
- Rust library for lifting raw binary data to LLVM IR☆60Updated 5 months ago
- Symbolic Execution based on lifting amd64 to z3☆29Updated last year
- Tracks cross references and allows fast viewing of pseudocode between references☆13Updated 9 months ago
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆80Updated 2 months ago
- ☆61Updated 10 months ago
- Easily search LLVM headers for all major versions!☆19Updated 3 months ago
- x86-64 user mode emulation using Zydis☆72Updated 3 months ago
- A collection of LLVM passes for obfuscating☆42Updated 2 years ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆109Updated last month
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆111Updated 2 months ago
- ☆12Updated 10 months ago
- Disassembler for Zeus VM custom instruction set☆29Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆88Updated last year
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆106Updated 4 years ago
- Binary Ninja plugin for automating VMProtect analysis☆63Updated 3 years ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆46Updated last week
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆64Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆106Updated last week
- devirtualization vmprotect☆64Updated 2 years ago
- LLDB based debugger for Linux Kernel☆27Updated 8 months ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆35Updated last year
- Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.☆41Updated last month
- Collection of Cheat dumps for Research and Detection.☆16Updated 5 months ago