Exploit Development and Reverse Engineering with GDB Made Easy
-
Updated
May 10, 2024 - Python
Exploit Development and Reverse Engineering with GDB Made Easy
Export disassemblies into Protocol Buffers
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Parses and symbolizes MSVC RTTI information in Binary Ninja.
In this repository, I will store my scripts that I create to automate some processes during some Reverse Engineering tasks. Some scripts are just code exercises, the main topic of which is reverse engineering.
Frida plugin for Binary Ninja
Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.
Loader for my Native Sigscan Binary Ninja plugin
Signature scanner and maker plugin for Binary Ninja
🥷 Soothing pastel theme for Binary Ninja
A Coverage Explorer for Reverse Engineers
a cooler signature scanning and creation library for binja
Easily capture Binary Ninja screenshots (in ultra-high resolution)
Binary Ninja plugin for interacting with the OALabs HashDB service
Binja (sort of) headless
A port of the Rosé Pine color themes for Binary Ninja
Harness for automated headless analysis & patching with Binary Ninja
Binary Ninja plugin providing various niche utilities for working with PE binaries
binary ninja plugin to find and generate patterns
Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address.
Add a description, image, and links to the binary-ninja topic page so that developers can more easily learn about it.
To associate your repository with the binary-ninja topic, visit your repo's landing page and select "manage topics."