An IDA Pro Plugin to extract Call Graphs and Control Flow Graphs from an assembly file written in Python.
☆66Oct 25, 2022Updated 3 years ago
Alternatives and similar repositories for IDA_Plugin
Users that are interested in IDA_Plugin are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Code for the paper "Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis"☆65Oct 6, 2022Updated 3 years ago
- ☆26Apr 18, 2019Updated 6 years ago
- The scalable bug search for binaries☆71Dec 17, 2016Updated 9 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Speculative disassembly, CFG recovery, and call-graph recovery from stripped binaries.☆108Jul 8, 2018Updated 7 years ago
- Dynamic Control Flow Recovery☆25Apr 15, 2018Updated 7 years ago
- Dynamic tracing for binary applications (using PIN), IDA plugin to visualize and interact with the traces☆96Mar 24, 2012Updated 14 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- A bunch of sample codes related to kernel fuzzing☆12Feb 7, 2019Updated 7 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆50Jan 10, 2022Updated 4 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Linux hooking engine for ARM architecture☆16May 4, 2015Updated 10 years ago
- Awesome materials for software supply chain security☆18May 13, 2020Updated 5 years ago
- SAFE: Self-Attentive Function Embeddings for binary similarity☆179Jul 17, 2023Updated 2 years ago
- ☆138Jun 15, 2018Updated 7 years ago
- IDA plugin to extract Mach-O binaries located in the disassembly or data☆61Jun 15, 2019Updated 6 years ago
- Code for the "Predictive Context-sensitive Fuzzing" NDSS'24 paper☆30Feb 29, 2024Updated 2 years ago
- Distributed Fuzzing for afl☆75Oct 31, 2015Updated 10 years ago
- Useful Plugin for IDA to Trace Function Call Tree☆27Jan 4, 2018Updated 8 years ago
- An IDA plugin to demangle Swift function names☆26Apr 23, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python command-line tool and GDB extension to view and save x86, ARM and objdump assembly files as control-flow graph (CFG) pdf files☆83Apr 1, 2024Updated last year
- A curated resource list of adversarial attacks and defenses for Windows PE malware detection.☆75Sep 2, 2022Updated 3 years ago
- Use Intel Pin tools to analysis binary.☆38Jul 19, 2015Updated 10 years ago
- Angha is a framework for constructing compilable synthetic C benchmarks out of publicly available C repositories.☆23Jul 7, 2023Updated 2 years ago
- CFG explorer for binaries☆85Oct 29, 2024Updated last year
- ☆11Jan 6, 2020Updated 6 years ago
- IMEI generator used in Huawei modified firmware☆13May 16, 2022Updated 3 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 5 years ago
- ☆87Nov 5, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- FoRTE-Research's fuzzing benchmarks☆57Mar 12, 2019Updated 7 years ago
- makecfg is a tool for making CFG(Control Flow Graph) from binary.☆18Jan 11, 2022Updated 4 years ago
- A set of programs used for benchmarking the strength of obfuscation☆94Feb 25, 2018Updated 8 years ago
- [code] "CFGExplainer: Explaining Graph Neural Network-Based Malware Classification from Control Flow Graphs" by Jerome Dinal Herath, Prit…☆39Aug 2, 2022Updated 3 years ago
- ☆13Jan 7, 2021Updated 5 years ago
- You can HIDE Doing jailbreak your iDevice.☆15Jan 27, 2021Updated 5 years ago
- 解析字符串引用,然后使用字符串引用加偏移定位关键函数,借助frida导出符号☆17May 8, 2024Updated last year