shuakabane / stelftools
cross-architecture static library detector for IoT malware
☆34Updated last year
Alternatives and similar repositories for stelftools:
Users that are interested in stelftools are comparing it to the libraries listed below
- Make the Windows API in Ghidra easy to read and informative.☆27Updated 3 years ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆98Updated last month
- A library for writing plugins in any decompiler: includes API lifting, common data formatting, and GUI abstraction!☆75Updated this week
- Triton-based DSE library with loading and exploration capabilities (and more!)☆109Updated last month
- A collection of resources/tools and analyses for the angr binary analysis framework.☆169Updated 2 years ago
- Run IDA scripts headlessly.☆128Updated 3 weeks ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆186Updated this week
- Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.☆189Updated 2 months ago
- libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)☆241Updated 2 years ago
- An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis☆213Updated 4 years ago
- Automatically identify and extract potential anti-debugging techniques used by malware.☆15Updated last month
- ☆72Updated 2 years ago
- TTexplore is a library that performs path exploration on binary code using symbolic execution☆75Updated 2 years ago
- Control-flow-flattening and string deobfuscator☆148Updated 3 years ago
- IDA Pro to Ghidra Key Bindings to feel like if you were in IDA Pro when navigating☆86Updated 5 years ago
- High performance fuzzing using riscv to x86 binary translations and modern fuzzing techniques☆149Updated 11 months ago
- Security Camp 2021 & GCC 2022☆113Updated 2 years ago
- makecfg is a tool for making CFG(Control Flow Graph) from binary.☆18Updated 3 years ago
- Make your Ghidra Lazy!☆143Updated 4 years ago
- Ghidra scripts for malware analysis☆91Updated last year
- ☆311Updated 6 months ago
- ☆51Updated 3 weeks ago
- angr's exploration technique to perform taint analysis☆54Updated 4 years ago
- Flex 'em lexers☆39Updated 4 years ago
- Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.☆11Updated last year
- A /proc/mem IDA loader to snapshot a running process☆160Updated 2 years ago
- Fuzzing Unification Framework☆370Updated last month
- This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultim…☆100Updated 4 months ago
- Ghidra Emulates Functions☆54Updated 4 years ago
- ☆142Updated 2 months ago