utkonos / lst2x64dbg
Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address.
☆108Updated last year
Alternatives and similar repositories for lst2x64dbg:
Users that are interested in lst2x64dbg are comparing it to the libraries listed below
- Analyses in IDA/Hex-Rays☆79Updated last year
- Devirtualize Virtual Calls☆114Updated 2 years ago
- It does the same thing as plugin FunctionStringAssociate for IDA, Now the script just works, in the future it is planned to increase the …☆56Updated last year
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago
- Static unpacker for FinSpy VM☆97Updated 3 years ago
- ☆99Updated 6 months ago
- Import an x64dbg database into a Ghidra Project☆22Updated 5 years ago
- Multi-tool reverse engineering collaboration solution.☆136Updated 9 months ago
- IDA plugin to explore and browse tags☆53Updated 5 years ago
- Collects extended function properties from IDA Pro databases☆91Updated 4 years ago
- IDA Pro plugin to show functions in a tree view☆115Updated 3 years ago
- reverse engineering extension plugin for windbg☆115Updated 5 years ago
- Plugin to embed Ghidra Decompiler into Binary Ninja☆96Updated 2 years ago
- Small programs and scripts that do not require their own repositories☆132Updated 2 years ago
- Integrate Ghidra's decompiler as an Ida plugin, this version has nice syntax highlighting, comments and other cool features.☆50Updated 3 years ago
- IDA Pro plugin that changes color of call instructions and works with all architectures☆57Updated 6 years ago
- ☆72Updated 3 years ago
- IDA python plugin to scan binary with Yara rules☆171Updated 11 months ago
- Patching system improvement plugin for IDA.☆40Updated 5 years ago
- An IDA Pro extension for easier (malware) reverse engineering☆110Updated 2 years ago
- Hexrays decompiler plugin that colorizes and filters the decompiler's output based on regular expressions☆126Updated last year
- ☆101Updated 3 years ago
- Pointer Sequence Reverser - enable you to see how Windows C++ application is accessing a particular data member or object.☆68Updated 7 years ago
- Parsers for custom malware formats ("Funky malware formats")☆92Updated 3 years ago
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Updated 3 years ago
- idamagnum is a plugin for integrating MagnumDB requests within IDA☆126Updated 4 years ago
- Control-flow-flattening and string deobfuscator☆148Updated 3 years ago
- ☆66Updated last year
- Notes on using the Python bindings for the Unicorn Engine☆71Updated 4 years ago
- IDA script to parse RTTI information in executable.☆153Updated last year