Cyber security

X64dbgbinja – Bridging The Gap Between Binary Ninja And X64dbg With An Official Plugin

The official plugin designed to enhance the synergy between Binary Ninja and x64dbg.

In this article, we’ll delve into the seamless integration of these powerful reverse engineering tools, showcasing how x64dbgbinja simplifies importing and exporting data between the two platforms.

Explore the installation process and discover how to efficiently transfer comments, labels, and symbols, ultimately streamlining your reverse engineering workflow.

Official x64dbg plugin for Binary Ninja.

Installation

Clone this repository in your Binary Ninja plugin directory.

Menu Options

Import X64dbg Database

Import comments/labels from an uncompressed x64dbg JSON database in Binary Ninja.

Symbols for imported functions and or library functions can be overwritten via the “Overwrite X” entries in Settings.

Export X64dbg Database

Export comments/labels to a JSON database that can be loaded by x64dbg.

To export labels only: uncheck “Export Comments” under “x64dbg Database Export” in Settings.

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

4 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

4 weeks ago