Cyber security

X64dbgbinja – Bridging The Gap Between Binary Ninja And X64dbg With An Official Plugin

The official plugin designed to enhance the synergy between Binary Ninja and x64dbg.

In this article, we’ll delve into the seamless integration of these powerful reverse engineering tools, showcasing how x64dbgbinja simplifies importing and exporting data between the two platforms.

Explore the installation process and discover how to efficiently transfer comments, labels, and symbols, ultimately streamlining your reverse engineering workflow.

Official x64dbg plugin for Binary Ninja.

Installation

Clone this repository in your Binary Ninja plugin directory.

Menu Options

Import X64dbg Database

Import comments/labels from an uncompressed x64dbg JSON database in Binary Ninja.

Symbols for imported functions and or library functions can be overwritten via the “Overwrite X” entries in Settings.

Export X64dbg Database

Export comments/labels to a JSON database that can be loaded by x64dbg.

To export labels only: uncheck “Export Comments” under “x64dbg Database Export” in Settings.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

WhatsMyName App – Find Anyone Across 640+ Platforms

Overview WhatsMyName is a free, community-driven OSINT tool designed to identify where a username exists…

1 week ago

Analyzing Directory Size Linux Tools Explained

Managing disk usage is a crucial task for Linux users and administrators alike. Understanding which…

1 week ago

Understanding Disk Usage with du Command

Efficient disk space management is vital in Linux, especially for system administrators who manage servers…

1 week ago

How to Check Directory Size in Linux

Knowing how to check directory sizes in Linux is essential for managing disk space and…

1 week ago

Essential Commands for Linux User Listing

Managing user accounts is a core responsibility for any Linux administrator. Whether you’re securing a…

1 week ago

Command-Line Techniques for Listing Linux Users

Linux offers powerful command-line tools for system administrators to view and manage user accounts. Knowing…

2 weeks ago