nshalabi / Coding-Ghidra
Java Library wrapper for Ghidra Headless Analysis + Java Samples
☆19Updated 2 years ago
Alternatives and similar repositories for Coding-Ghidra:
Users that are interested in Coding-Ghidra are comparing it to the libraries listed below
- Ghidra Emulates Functions☆54Updated 4 years ago
- ☆30Updated 4 years ago
- Ghidra loader module for the Mobicore trustlet and driver binaries☆27Updated 5 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 5 years ago
- Futile attempt to solve the Tigress challenges using angr☆22Updated 5 years ago
- Python based angr plug in for IDA Pro.☆34Updated 6 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Updated 3 years ago
- a few Ghidra scripts for dumping PCode data☆50Updated 5 years ago
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 3 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Updated 3 years ago
- Python portage of the Microcode Explorer plugin☆31Updated 5 years ago
- Build your emulation environment as needed☆64Updated 3 years ago
- NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!☆59Updated 3 years ago
- A simple, web based dashboard to use with LibAFL + OnDiskJSONMonitor☆24Updated 8 months ago
- Load function names from an IDA Pro database inside GDB☆20Updated 6 years ago
- FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques☆35Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆82Updated last year
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆54Updated 3 years ago
- ☆26Updated 6 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A PCode Emulator for Ghidra.☆106Updated 3 years ago
- ☆76Updated 3 years ago
- ARG: Automatic ROP chains Generation☆22Updated 5 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆46Updated 8 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆18Updated 4 years ago
- A library to translate native code for multiple architectures into Tiny Code Generator (TCG) based intermediate representation (IR), base…☆46Updated 4 years ago