mrphrazer / r2con2020_deobfuscation
☆76Updated 3 years ago
Alternatives and similar repositories for r2con2020_deobfuscation:
Users that are interested in r2con2020_deobfuscation are comparing it to the libraries listed below
- ☆72Updated 3 years ago
- Collects extended function properties from IDA Pro databases☆91Updated 4 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆68Updated 5 years ago
- Build your emulation environment as needed☆64Updated 3 years ago
- Making Type Info Library (TIL) file for Apache modules☆54Updated 3 years ago
- Various scripts for the Hexrays decompiler☆93Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- Ghidra RE scripts☆38Updated 3 years ago
- Small programs and scripts that do not require their own repositories☆132Updated 2 years ago
- nanoMIPS IDA plugin☆66Updated 3 years ago
- ☆47Updated 2 years ago
- Cumulative cyclomatic complexity calculation for Ghidra☆20Updated 4 years ago
- ☆63Updated last month
- PoC for a taint based attack on VMProtect☆109Updated 5 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 6 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Alternative API for IDA / Hex-Rays☆72Updated last year
- Xyntia, the black-box deobfuscator☆64Updated 2 years ago
- idapm is IDA Plugin Manager via GitHub Repository.☆58Updated 4 years ago
- ☆56Updated 2 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆70Updated 5 years ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- Files for my solution to the SSTIC 2021 challenge☆15Updated 3 years ago
- Fork of Synacktiv's private Lumina server☆21Updated 2 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated last year
- Create and use macros in IDA's CLIs☆63Updated last year
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 8 years ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆51Updated 5 years ago
- ☆80Updated 2 years ago
- ☆74Updated 2 years ago