nccgroup / ghostringsLinks
Ghidra scripts for recovering string definitions in Go binaries
☆118Updated 10 months ago
Alternatives and similar repositories for ghostrings
Users that are interested in ghostrings are comparing it to the libraries listed below
Sorting:
- A tool for firmware cartography☆158Updated 3 months ago
- ☆74Updated 9 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆119Updated last year
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆132Updated 2 weeks ago
- Make your Ghidra Lazy!☆152Updated 5 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆70Updated last year
- A utility to fix intentionally corrupted UPX packed files.☆90Updated 2 years ago
- Multi-tool reverse engineering collaboration solution.☆140Updated last year
- Binarly Vulnerability Research Advisories☆180Updated last month
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆106Updated last year
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆113Updated 2 months ago
- Slides, recordings and materials of my public presentations, talks and workshops.☆78Updated 3 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- This project tries to provide additional Ghidra Version Tracking Correlators suitable for patch diffing.☆92Updated last year
- ☆82Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆131Updated 4 months ago
- ☆74Updated last year
- Google Chrome Use After Free☆59Updated 3 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- Reverse engineering software using a full system simulator☆184Updated this week
- Highly advanced Linux anti-exploitation and anti-tamper binary protector for ELF.☆162Updated 3 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 10 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆138Updated 2 years ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆96Updated 7 months ago
- Static Binary Instrumentation tool for Windows x64 executables☆205Updated 4 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆49Updated 10 months ago
- ☆28Updated 3 years ago
- ☆79Updated last year