Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/fr0gger/awesome-ida-x64-olly-plugin
A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.
https://github.com/fr0gger/awesome-ida-x64-olly-plugin
List: awesome-ida-x64-olly-plugin
Last synced: 8 days ago
JSON representation
A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.
- Host: GitHub
- URL: https://github.com/fr0gger/awesome-ida-x64-olly-plugin
- Owner: fr0gger
- Created: 2019-02-14T14:52:35.000Z (almost 6 years ago)
- Default Branch: master
- Last Pushed: 2024-03-05T03:36:30.000Z (9 months ago)
- Last Synced: 2024-05-20T03:38:25.839Z (7 months ago)
- Homepage:
- Size: 69.3 KB
- Stars: 1,181
- Watchers: 45
- Forks: 144
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-malware-resources - Awesome IDA, x64DBG & OllyDBG plugins
- awesome-reverse-engineering - **363**星
- awesome-security-collection - **363**星
- ultimate-awesome - awesome-ida-x64-olly-plugin - A curated list of IDA x64DBG, Ghidra and OllyDBG plugins. . (Other Lists / PowerShell Lists)
- awesome-hacking-lists - fr0gger/awesome-ida-x64-olly-plugin - A curated list of IDA x64DBG, Ghidra and OllyDBG plugins. (Others)
README
# Awesome IDA, Ghidra, x64DBG, GDB & OllyDBG plugins [![Awesome](https://awesome.re/badge.svg)](https://awesome.re)
A curated list of IDA, x64DBG, Ghidra, GDB and OllyDBG plugins. [IDA](https://www.hex-rays.com/products/ida/) is a powerful disassembler and debugger that allows to analyze binary, it also includes a decompiler. [X64DBG](https://x64dbg.com/#start) is an open-source x64/x32 debugger for Windows. [OllyDbg](http://www.ollydbg.de/) is a 32-bit assembler level analysing debugger for Windows.## Content
* [IDA Plugins](#IDA-Plugins)
* [Ghidra Plugins](#Ghidra-Plugins)
* [X64dbg Plugins](#x64dbg-Plugins)
* [OllyDBG Plugins](#OllyDBG-PLugins)
* [GDB Plugins](#GDB-PLugins)## IDA Plugins
* [Keypatch](http://keystone-engine.org/keypatch): Friendly assembly-level patching/searching plugin (using multi-arch assembler framework [Keystone engine](http://keystone-engine.org) inside).
* [Lazy ida](https://github.com/L4ys/LazyIDA): Add functionalities such as function return removing, converting data, scanning for string vulnerabilities.
* [IDAemu](https://github.com/36hours/idaemu): Use for emulating code in IDA Pro. It is based on unicorn-engine.
* [IDA_EA](https://github.com/1111joe1111/ida_ea): A set of exploitation/reversing aids for IDA.
* [Labeless](https://github.com/a1ext/labeless): System for labels/comments synchronization with a debugger backend.
* [Idadiff](https://github.com/0x00ach/idadiff): A diffing tool using [Machoc Hash](https://github.com/ANSSI-FR/polichombr/blob/dev/docs/MACHOC_HASH.md).
* [IDA Skin](https://github.com/zyantific/IDASkins): Plugin providing advanced skinning support for IDA Pro utilizing Qt stylesheets, similar to CSS.
* [Auto Re](https://github.com/a1ext/auto_re): Auto-renaming dummy-named functions, which have one API call or jump to the imported API.
* [IDA IPython](https://github.com/james91b/ida_ipython): An IDA Pro Plugin for embedding an IPython.
* [IDA Sploiter](https://github.com/iphelix/ida-sploiter): An exploit development and vulnerability research
plugin.
* [IDATropy](https://github.com/danigargu/IDAtropy): It is designed to generate charts of entropy and histograms using the power of idapython and matplotlib.
* [IDA Patcher](https://github.com/iphelix/ida-patcher): It is designed to enhance IDA's ability to patch binary files and memory.
* [IDAHunt](https://github.com/nccgroup/idahunt): Analyze binaries with IDA Pro and hunt for things in IDA Pro.
* [IDA for Delphi](https://github.com/Coldzer0/IDA-For-Delphi): IDA Python Script to Get All function names from Event Constructor (VCL).
* [IDA ARM Highlight](https://github.com/gdelugre/ida-arm-system-highlight): Highlighting and decoding ARM system instructions.
* [BinDiff](https://www.zynamics.com/bindiff.html): It is a comparison tool for binary files, that assists vulnerability researchers and engineers to quickly find differences and similarities in disassembled code.
* [Diaphora](https://github.com/joxeankoret/diaphora): It is a program diffing plugin for IDA, similar to Zynamics Bindiff.
* [Yaco](https://github.com/DGA-MI-SSI/YaCo): Collaborative Reverse-Engineering for IDA.
* [IDASignSrch](https://sourceforge.net/projects/idasignsrch/): It can recognize tons of compression, multimedia and encryption algorithms and many other things like known strings and anti-debugging code.
* [Findcrypt2](http://www.hex-rays.com/idapro/freefiles/findcrypt.zip): It searches constants known to be associated with cryptographic algorithm in the code.
* [Driver Buddy](https://github.com/nccgroup/DriverBuddy): It assists with the reverse engineering of Windows kernel drivers.
* [Heap Viewer](https://github.com/danigargu/heap-viewer): Used to examine the glibc heap, focused on exploit development.
* [IDAScope](https://github.com/danielplohmann/idascope): It consists of multiple tabs, containing functionality to achieve different goals such as fast identification of semantically interesting locations.
* [HexRayPytools](https://github.com/igogo-x86/HexRaysPyTools): Assist in the creation of classes/structures and detection of virtual tables.
* [Ponce](https://github.com/illera88/Ponce): Symbolic Execution just one-click away!
* [idenLib.py](https://github.com/secrary/IDA-scripts/tree/master/idenLib): [idenLib](https://github.com/secrary/idenLib) (Library Function Identification ) plugin for `IDA Pro`
* [J.A.R.V.I.S](https://github.com/carlosgprado/JARVIS) A plugin for IDA Pro to assist you with the most common reversing tasks. It integrates with the (J.A.R.V.I.S) tracer.
* [golang_loader_assist](https://github.com/strazzere/golang_loader_assist): Making GO reversing easier in IDA Pro
* [FindYara](https://github.com/OALabs/FindYara): IDA python plugin to scan binary with yara rules.
* [Karta](https://github.com/CheckPointSW/Karta): Source code assisted fast binary matching plugin for IDA
* [VT-IDA-PLUGIN](https://github.com/VirusTotal/vt-ida-plugin): This plugin integrates functionality from VirusTotal web services into the IDA Pro's user interface.
* [mkYARA](https://github.com/fox-it/mkYARA): mkYARA comes with a IDA plugin to easily create YARA signatures by selecting a set of instructions and choosing one of the mkYARA -> Generate YARA rule options.
* [Oregami](https://github.com/shemesh999/oregami): IDA plugins and scripts for analyzing register usage frame.
* [IDA_IFL](https://github.com/hasherezade/ida_ifl): A small plugin with a goal to provide user-friendly way to navigate between functions and their references.
* [xray](https://github.com/patois/xray): xray is a plugin for the Hexrays decompiler that both filters and colorizes the textual representation of the decompiler's output based on configurable regular expressions.
* [Lighthouse](https://github.com/gaasedelen/lighthouse): Lighthouse is a powerful code coverage plugin for IDA Pro and Binary Ninja. As an extension of the leading disassemblers, this plugin enables one to interactively explore code coverage data in new and innovative ways when symbols or source may not be available for a given binary.
* [CAPA Explorer](https://github.com/fireeye/capa/tree/master/capa/ida/plugin): Capa explorer is an IDA Pro plugin written in Python that integrates the FLARE team's open-source framework, capa, with IDA.
* [Ghida](https://github.com/Cisco-Talos/GhIDA): GhIDA is an IDA Pro plugin that integrates the Ghidra decompiler in IDA.
* [vt-ida-plugin](https://github.com/VirusTotal/vt-ida-plugin): This plugin integrates functionality from VirusTotal web services into the IDA Pro's user interface.
* [Virtuailor](https://github.com/0xgalz/Virtuailor): IDAPython tool for C++ vtables reconstruction.
* [ipyda](https://github.com/eset/ipyida): PyIDA is a python-only solution to add an IPython console to IDA Pro.
* [ComIDA](https://github.com/airbus-cert/comida): An IDA Plugin that help during the analysis of modules using COM.
* [D810](https://gitlab.com/eshard/d810): D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode.
* [lumen](https://github.com/naim94a/lumen): A private Lumina server for IDA Pro.
* [Hexrays Toolbox](https://github.com/patois/HexraysToolbox): Hexrays Toolbox is a script for the Hexrays Decompiler which can be used to find code patterns within decompiled code.
* [HRDevHelper](https://github.com/patois/HRDevHelper): This plugin for the HexRays decompiler creates a graph of a decompiled function's AST using IDA's internal graph viewer.
* [dsync](https://github.com/patois/dsync): IDAPython plugin that synchronizes disassembler and decompiler views.
* [IDACyber](https://github.com/patois/IDACyber): IDACyber is an interactive data visualization plugin for IDA Pro. It consists of external "color filters" that transform raw data bytes into a canvas that can be used to inspect and navigate data interactively.
* [abyss](https://github.com/patois/abyss): Augmentation of postprocess Hexrays decompiler output.
* [genmc](https://github.com/patois/genmc): genmc is an IDAPython script/plugin hybrid that displays Hexrays decompiler microcode, which can help in developing microcode plugins.
* [ida-minsc](https://github.com/arizvisa/ida-minsc): IDA-minsc is a plugin for IDA Pro that assists a user with scripting the IDAPython plugin that is bundled with the disassembler.
* [Bip](https://github.com/synacktiv/bip): Bip is a project which aims to simplify the usage of python for interacting with IDA. Its main goals are to facilitate the usage of python in the interactive console of IDA and the writing of plugins.
* [FIDL](https://github.com/fireeye/FIDL): This is a set of utilities wrapping the decompiler API into something sane. This code focus on vulnerability research and bug hunting.
* [flare-emu](https://github.com/fireeye/flare-emu): flare-emu marries a supported binary analysis framework, such as IDA Pro or Radare2, with Unicorn’s emulation framework to provide the user with an easy to use and flexible interface for scripting emulation tasks.
* [CTO (Call Tree Overviewer)](https://github.com/herosi/CTO): CTO (Call Tree Overviewer) is an IDA plugin for creating a simple and efficiant function call tree graph. It can also summarize function information such as internal function calls, API calls, static linked library function calls, unresolved function calls, string references, structure member accesses, specific comments.
* [HashDB](https://github.com/OALabs/hashdb-ida): Malware string hash lookup plugin for IDA Pro. This plugin connects to the OALABS HashDB Lookup Service.
* [deREferencing](https://github.com/danigargu/deREferencing): deReferencing is an IDA Pro plugin that implements new registers and stack views. Adds dereferenced pointers, colors and other useful information, similar to some GDB plugins (e.g: PEDA, GEF, pwndbg, etc).
* [syms2elf](https://github.com/danigargu/syms2elf): The plugin export the symbols (for the moment only functions) recognized by IDA Pro and radare2 to the ELF symbol table.
* [retdec-idaplugin](https://github.com/avast/retdec-idaplugin): RetDec plugin for IDA (Interactive Disassembler). The plugin comes at both 32-bit and 64-bit address space variants (both are 64-bit binaries).
* [VMAttack](https://github.com/anatolikalysch/VMAttack): IDA Pro Plugin for static and dynamic virtualization-based packed analysis and deobfuscation.
* [BinCAT](https://github.com/airbus-seclab/bincat): Binary code static analyser, with IDA integration. Performs value and taint analysis, type reconstruction, use-after-free and double-free detection.
* [ttddbg - Time Travel Debugging IDA plugin](https://github.com/airbus-cert/ttddbg): This plugin adds a new debugger to IDA which supports loading Time Travel Debugging traces generated using WinDBG Preview.
* [IDA Plugin List](https://vmallet.github.io/ida-plugins/): An additional list that contains multiple IDA plugin.
* [Gepetto](https://github.com/JusticeRage/Gepetto): Gepetto is a Python script which uses OpenAI's ChatGPT to provide meaning to functions decompiled by IDA Pro.
* [DAILA](https://github.com/mahaloz/DAILA): A decompiler-unified plugin for accessing the OpenAI API to improve your decompilation experience
* [VulChatGPT](https://github.com/ke0z/VulChatGPT): Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries.
* [gooMBA](https://github.com/HexRaysSA/goomba): gooMBA is a Hex-Rays Decompiler plugin to simplify Mixed Boolean-Arithmetic (MBA) expressions.
* [NOP_Plugin](https://github.com/RussianPanda95/NOP_Plugin): Plugin for NOPing instructions in IDA.
* [Copilot for IDA Pro](https://github.com/Antelcat/ida_copilot): ChatGPT Agent analyses your IDA pseudocode.## Ghidra Plugins
* [Ghidra Scripts](https://github.com/tacnetsol/ghidra_scripts): Port of devttyS0's IDA plugins to the Ghidra plugin framework, new plugins as well.
* [Ghidra Scripts 2](https://github.com/AllsafeCyberSecurity/ghidra_scripts): Ghidra script for malware analysis.
* [Findcrypt](https://github.com/d3v1l401/FindCrypt-Ghidra): IDA Pro's FindCrypt ported to Ghidra, with an updated and customizable signature database.
* [Lazy Ghidra](https://github.com/AllsafeCyberSecurity/LazyGhidra): Make your Ghidra Lazy.
* [Pcode Emulator](https://github.com/kc0bfv/pcode-emulator): A PCode Emulator for Ghidra.
* [dragondance](https://github.com/0ffffffffh/dragondance): Dragon Dance is a plugin for Ghidra to get visualize and manipulate the binary code coverage data.
* [ghidra_nodejs](https://github.com/PositiveTechnologies/ghidra_nodejs): Ghidra plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries.
* [cantordust](https://github.com/Battelle/cantordust): CantorDust is a binary visulization tool used to aid reverse engineering efforts. It allows humans to utilize their superior visual pattern recognition to identify patterns in binary data.
* [ghidra-findcrypt](https://github.com/TorgoTorgo/ghidra-findcrypt): Ghidra analysis plugin to locate cryptographic constants (This is a re-write of another Ghidra FindCrypt script as an auto analysis module).
* [Awesome Ghidra](https://github.com/AllsafeCyberSecurity/awesome-ghidra): A list of additionnal Ghidra plugins.
* [Ghidrathon](https://github.com/mandiant/Ghidrathon): Ghidrathon is a Ghidra extension that adds Python 3 scripting capabilities to Ghidra.
* [GptHidra](https://github.com/evyatar9/GptHidra): GptHidra is a Ghidra plugin that uses the OpenAI Chat GPT to explain functions. With GptHidra, you can easily understand the purpose and behavior of functions in your codebase.
* [Replica](https://github.com/reb311ion/replica): Ghidra Analysis Enhancer - Automatically enhance Ghidra's auto analysis with additional scripts and features.
* [AskJOE](https://github.com/securityjoes/AskJOE): AskJoe is a tool that utilizes OpenAI to assist researchers wanting to use Ghidra as their malware analysis tool.## x64dbg Plugins
* [Checksec](https://github.com/klks/checksec): x64dbg plugin to check security settings.
* [ClawSearch](https://github.com/codecat/ClawSearch): A memory scanner plugin for x64dbg, inspired by Cheat Engine.
* [x64DBGPYLIB](https://github.com/x64dbg/x64dbgpylib): Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.
* [xAnalyzer](https://github.com/ThunderCls/xAnalyzer): It is capable of doing various types of analysis over the static code of the debugged application to give more extra information to the user.
* [x64DBGIDA](https://github.com/x64dbg/x64dbgida): Official x64dbg plugin for IDA Pro.
* [x64dbg Dark Theme](https://github.com/nextco/x64dbg-dark): Simple dark theme.
* [X64DBG YaraGen](https://github.com/mrexodia/YaraGen): Generate Yara rules from function basic blocks.
* [Diff](https://github.com/mrexodia/Diff): Very simple plugin to diff a section in memory with a file.
* [Unpacking Script](https://github.com/x64dbg/Scripts): Unpacking script for x64dbg.
* [Anti Anti](https://github.com/brock7/xdbg): Open-source user-mode Anti-Anti-Debug plugin.
* [ScyllaHide](https://github.com/x64dbg/ScyllaHide): https://github.com/x64dbg/ScyllaHide
* [Highlightfish](https://github.com/Insid3CodeTeam/Highlightfish): Plugin to customize x64dbg.
* [TitanHide](https://github.com/mrexodia/TitanHide): It is a driver intended to hide debuggers from certain processes.
* [idenLibX](https://github.com/secrary/idenLibX): [idenLib](https://github.com/secrary/idenLib) (Library Function Identification ) plugin for `x32dbg`/`x64dbg`
* [Official x64dbg plugins](https://github.com/x64dbg/x64dbg/wiki/Plugins): Official repository of the x64dbg debugger plugins.
* [x64dbgpy](https://github.com/x64dbg/x64dbgpy): Automating x64dbg using Python, Snapshots.
* [Multiline Ultimate Assembler](https://ramensoftware.com/multimate-assembler): A multiline (and ultimate) assembler (and disassembler) plugin for x64dbg and OllyDbg. A perfect tool for modifying and extending a compiled executable functionality.## OllyDBG Plugins
* [OllyDumpEx](https://tuts4you.com/download/3451/): This plugin is process memory dumper for OllyDbg.
* [OllyDeobfuscator](https://tuts4you.com/download/3549/): Deobfuscator for Olly.
* [Phantom](https://tuts4you.com/download/1276/): Anti anti-debug trick.
* [TLSCatch 0.3](https://tuts4you.com/download/3014/): This plugin simply intercepts any new module loaded into the current process address space, searches it for TLS callbacks.
* [AnalyzeThis](https://tuts4you.com/download/2848/): Assisting for unpacking.
* [Multiline Ultimate Assembler](https://ramensoftware.com/multimate-assembler): A multiline (and ultimate) assembler (and disassembler) plugin for x64dbg and OllyDbg. A perfect tool for modifying and extending a compiled executable functionality.## GDB Plugins
* [GEF](https://github.com/hugsy/gef): GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers.
* [pwndbg](https://github.com/pwndbg/pwndbg): Pwndbg is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.
* [Voltron](https://github.com/snare/voltron): Voltron is an extensible debugger UI toolkit written in Python. It aims to improve the user experience of various debuggers (LLDB, GDB, VDB and WinDbg)
* [gdbghidra](https://github.com/Comsecuris/gdbghidra): gdbghidra - a visual bridge between a GDB session and GHIDRA
* [angrgdb](https://github.com/andreafioraldi/angrgdb): Use angr inside GDB. Create an angr state from the current debugger state.