schlafwandler / ghidra_ExportToX64dbg
A Ghidra script to export data to a x64dbg database
☆28Updated last year
Related projects: ⓘ
- Extract annoations from Ghidra into an X32/X64 dbg database☆56Updated 3 years ago
- PDB Dumping Tool☆56Updated last year
- ☆21Updated 3 years ago
- ☆23Updated this week
- FunctionStringAssociate plugin by sirmabus, ported to IDA 7☆25Updated 4 years ago
- My personal cheat sheet for the x64dbg python plugin.☆25Updated 4 years ago
- idenLib (Library Function Identification) plugin for x32dbg☆40Updated 5 years ago
- Patching system improvement plugin for IDA.☆39Updated 5 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆20Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆25Updated 6 years ago
- x64dbg scripts for finding OEP of packers☆14Updated 5 years ago
- APISearch Plugin (x86) - A Plugin For x64dbg☆50Updated 6 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 5 years ago
- ☆12Updated this week
- This x64dbg plugin adds several commands for dumping PE header information by address.☆60Updated 7 years ago
- Import DynamoRIO drcov code coverage data into Ghidra☆41Updated 9 months ago
- ☆16Updated 2 years ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Updated 5 years ago
- ☆33Updated 3 years ago
- SigMaker plugin for Binary Ninja☆9Updated 4 years ago
- reverse engineering extension plugin for windbg☆114Updated 4 years ago
- ☆16Updated 6 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆34Updated 7 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆57Updated last month
- Import an x64dbg database into a Ghidra Project☆22Updated 5 years ago
- A ready-made template for a project based on libpeconv.☆40Updated last year
- [F]aster [U]niversal [U]npacker☆44Updated 11 years ago
- PE Library x86☆20Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago