nstarke / BaseAddressDiscovererererLinks
This tool bruteforces the file offset and base load address for a raw binary program file
☆15Updated 2 months ago
Alternatives and similar repositories for BaseAddressDiscoverererer
Users that are interested in BaseAddressDiscoverererer are comparing it to the libraries listed below
Sorting:
- PoC code and tools for Black Hat USA 2024☆21Updated last year
- BINARLY Research Tools and PoCs☆36Updated 10 months ago
- ☆37Updated 2 years ago
- Scripts from Ghidra Golf competitions☆34Updated 2 years ago
- A MBR Fuzzer☆29Updated last year
- Another™ MCP Server for Binary Ninja with superpower 🥵☆28Updated 2 months ago
- weggli ruleset scanner for source code and binaries☆29Updated 2 months ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- ☆74Updated 7 months ago
- ☆11Updated 3 years ago
- nanoMIPS module for Ghidra☆52Updated 8 months ago
- Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.☆52Updated 3 weeks ago
- Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.☆50Updated 3 weeks ago
- ☆28Updated 6 months ago
- Diaphora Machine Learning tools and datasets☆22Updated 10 months ago
- Wrapper around Ghidra's analyzeHeadless script☆13Updated 3 years ago
- ☆41Updated last year
- Frida plugin for Binary Ninja☆18Updated 6 months ago
- ☆10Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 7 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆49Updated 9 months ago
- ☆24Updated last year
- ☆21Updated last year
- A tool for firmware cartography☆157Updated last month
- iTLB multihit PoC☆41Updated last year
- One Bootloader to Load Them All - Research materials, Code , Etc.☆52Updated 2 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- ☆16Updated last year
- ☆36Updated last year