sophoslabs / emotet_unflatten_poc
Modified python version of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to unflatten Emotet'S Control Flow Flattening
☆26Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for emotet_unflatten_poc
- IDA Pro plugin that displays all comments in a database☆63Updated 3 months ago
- Binary Ninja plugin to clean up some common obfuscation techniques.☆19Updated 4 years ago
- Hex-Rays Block Highlighter plugin for IDA to highlight if/for/do/switch/while blocks☆60Updated 2 years ago
- IDAPatternSearch adds a capability of finding functions according to bit-patterns into the well-known IDA Pro disassembler based on Ghidr…☆62Updated 3 years ago
- IDA plugin displaying the P-Code for the current function☆64Updated last year
- ☆56Updated 2 years ago
- Go fastcall analysis for ida decompiler☆28Updated 6 months ago
- ☆71Updated 3 years ago
- Tool that automates some useful structure routines in IDA PRO☆74Updated 8 months ago
- Greybox Synthesizer geared for deobfuscation of assembly instructions.☆141Updated last year
- Port of MBA Solver SiMBA to C/C++☆76Updated 2 weeks ago
- IDA strike-out: A Hex-Rays decompiler plugin to patch the Ctree☆99Updated 2 months ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆67Updated 5 years ago
- Control-flow-flattening and string deobfuscator☆147Updated 3 years ago
- An IDA plugin which demangles Rust function names☆31Updated 11 months ago
- Non-linear Mixed Boolean-Arithmetic Expressions☆57Updated 7 months ago
- ☆46Updated 4 months ago
- Simplification of General Mixed Boolean-Arithmetic Expressions: GAMBA☆120Updated last year
- Alternative API for IDA / Hex-Rays☆72Updated last year
- ☆44Updated last month
- Deobfuscation of Semi-Linear Mixed Boolean-Arithmetic Expressions☆58Updated 2 weeks ago
- Small programs and scripts that do not require their own repositories☆129Updated 2 years ago
- Toy LLVM obfuscator pass☆70Updated 3 years ago
- Debug IDAPython in VSCode☆19Updated last year
- IDA Plugin that fills in missing indirect CALL & JMP target information☆115Updated last year
- ☆76Updated 3 years ago
- How to setup Pycharm to run scripts in IDA using the Run menu (or a keybind)☆39Updated 5 months ago
- IDA-names automatically renames pseudocode windows with the current function name.☆49Updated last year