A collection of pwn/CTF related utilities for Ghidra
-
Updated
Sep 10, 2024 - Python
A collection of pwn/CTF related utilities for Ghidra
Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.
🐉 Export ghidra decompiled code to dwarf sections inside ELF binary
A Pythonic Ghidra standard library
A Ghidra script that enables the analysis of selected functions and instructions using Large Language Models (LLMs). It aims to make reverse-engineering more efficient by using Ollama's API directly within Ghidra.
Personal collection of scripts for the Ghidra reverse engineering framework.
Ctrl+P plugin for Ghidra: quick search and command palette.
A collection of some useful Ghidra scripts
Jupyter Kernel for Ghidra's Jython
Make the Windows API in Ghidra easy to read and informative.
A Delphi symbol name recovery tool for reverse engineers.
Stack String Explorer is a ghidra plugin to find and report stack strings (and other constant strings). Identified strings are commented and placed in the defined strings window for easy analysis.
Some Ghidra scripts to automate my reverse-engineering tasks
Ghidra Analysis Enhancer 🐉 Python3 version.
Scripts for unlinking a program back into relocatable object ELF files with Ghidra
Set of usefull (or not) scripts used for reverse engineering Diablo 2 v1.14d game using Ghidra
My collection of scripts for Ghidra (https://github.com/NationalSecurityAgency/ghidra)
Add a description, image, and links to the ghidra-scripts topic page so that developers can more easily learn about it.
To associate your repository with the ghidra-scripts topic, visit your repo's landing page and select "manage topics."