mandiant / xreferLinks
FLARE Team's Binary Navigator
☆295Updated last month
Alternatives and similar repositories for xrefer
Users that are interested in xrefer are comparing it to the libraries listed below
Sorting:
- ☆109Updated 2 years ago
- Get information about stripped rust executables☆38Updated 6 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆122Updated 5 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆155Updated last year
- ☆212Updated 2 years ago
- HashDB API hash lookup plugin for IDA Pro☆345Updated last month
- Repository for the code snippets from the AllThingsIDA video channel☆118Updated last month
- How to retro theme your Ghidra☆35Updated last month
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆471Updated 5 months ago
- Research notes☆131Updated 11 months ago
- Rust symbol recovery tool☆75Updated 5 months ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆644Updated 8 months ago
- An intuitive query API for IDA Pro☆163Updated last month
- Assortment of hashing algorithms used in malware☆387Updated last month
- The FLARE team's open-source library to disassemble Common Intermediate Language (CIL) instructions.☆169Updated last month
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 2 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆75Updated 3 months ago
- Powershell script deobfuscation using AST in Python☆72Updated 2 months ago
- The MinHash-based Code Relationship & Investigation Toolkit (MCRIT) is a framework created to simplify the application of the MinHash alg…☆95Updated 2 weeks ago
- Code Coverage Exploration Plugin for Ghidra☆370Updated last year
- A command line Windows API tracing tool for Golang binaries.☆158Updated 2 years ago
- Writeups for CTF challenges☆33Updated 2 years ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆80Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 8 months ago
- capemon: CAPE's monitor☆142Updated this week
- A headless, extendable, multi-session, IDA Pro MCP framework.☆83Updated 2 months ago
- IDA Pro plugin for recognizing known hashes of API function names☆82Updated 3 years ago
- Native Python3 bindings for @horsicq's Detect-It-Easy☆75Updated 6 months ago
- A Pythonic Ghidra standard library☆177Updated last month
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆352Updated last week