This repository outlines my software security lab materials for the lab conducted by Imtiaj Ahmed Chowdhury, Lecturer, IUT along with Sabrina Islam, Lecturer, IUT
-
Updated
Apr 15, 2024 - Python
Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission.
This repository outlines my software security lab materials for the lab conducted by Imtiaj Ahmed Chowdhury, Lecturer, IUT along with Sabrina Islam, Lecturer, IUT
Scripts for analysis of SEH4 in windows executables
ghidralyzer is a script that automates the process of creating a project, importing and analyzing a binary in Ghidra from the command line.
This repository provides educational resources and practical examples for understanding and analyzing malware. It includes tutorials, quizzes, presentations, exercises, sample code, and articles that cover various aspects of malware analysis, incident response, and cybersecurity.
Simple script for ghidra to rename the default function names into better looking names that can be differed from afar
Process malware samples and analyse them with Ghidra and BinaryNinja! 🐉🥷
Teleport Python code from CPython to Jython
Gets the offset of an address, or gets the address of an offset in Ghidra.
My Ghidra script to analyze binary files to find the most complex functions.
Ghidra decompiler support for the virtual Intcode CPU
A collection of Ghidra scripts I've written to help with reverse engineering
Scripts that I used to gather data for my research internship at ASU's SEFCOM Lab. My project centered around evaluating the decompilation quality of angr and GHIDRA
Created by National Security Agency
Released March 5, 2019
Latest release 9 days ago