splishy-splash / RE-scripts
a small curation of created/stolen scripts for reverse engineering
☆12Updated 11 months ago
Alternatives and similar repositories for RE-scripts:
Users that are interested in RE-scripts are comparing it to the libraries listed below
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆133Updated 7 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆86Updated 2 years ago
- ☆31Updated 2 years ago
- Writeups for CTF challenges☆30Updated last year
- Python bindings for the Icicle emulator.☆26Updated 2 months ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆18Updated 5 months ago
- How to retro theme your Ghidra☆35Updated 5 months ago
- ☆47Updated last month
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆57Updated last year
- Helpful WinDBG command for kernel debugging☆22Updated 4 years ago
- Get information about stripped rust executables☆27Updated last week
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 2 years ago
- UnpacMe IDA Byte Search☆28Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆89Updated 3 years ago
- Rust symbol recovery tool☆45Updated last week
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆108Updated 11 months ago
- Easy-to-use IDA plugin for code emulation☆30Updated 10 months ago
- An automatic tool for fixing dumped PE files☆41Updated 4 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆37Updated 5 months ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆151Updated last year
- Kernel ReClassEx☆65Updated last year
- Hyper-V related resources☆30Updated last year
- Convenience routines for working with the Unicorn emulator in Python☆25Updated 2 months ago
- Windows PDB parser for kernel-mode environment.☆95Updated 2 years ago
- A devirtualization engine for Themida.☆97Updated last year
- ☆23Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆91Updated 5 months ago
- ☆25Updated 5 months ago
- Binary rewriter for 64-bit PE files.☆70Updated last year