Euarno

Euarno / PatchEx

Public

PatchEx 是一个面向 IDA Pro 的汇编与字节补丁插件,适用于逆向分析、漏洞研究、二进制修复、CTF/AWDP 等需要精确修改和可靠回滚的场景。

19
5
100% credibility
Found May 06, 2026 at 19 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

PatchEx is a plugin for disassembly tools that lets users modify binary code by entering new assembly instructions or raw bytes, with previews, space detection, and reversible history.

How It Works

1
🔍 Spot the code to tweak

In your program viewer, you highlight the exact spot where you want to change some instructions.

2
⌨️ Open the patch helper

Press a quick shortcut like Ctrl+Shift+P to bring up the friendly patching window.

3
Enter your changes

Type simple new instructions or byte values, and instantly see a preview of how it fits.

4
Check if it fits
Fits perfectly

Click patch to update right there with some safe filler if needed.

🔍
Needs more space

Scan for empty spots in the program, pick one, then patch safely.

5
🚀 Make it happen

Hit the patch button to apply your changes smoothly.

🎉 All set with undo

Your program is updated just how you wanted, and you can always undo anytime from the history.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 19 to 19 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is PatchEx?

PatchEx is a Python plugin for IDA Pro that lets you patch binaries directly in the disassembler—select code, enter new assembly or raw bytes, and it assembles with symbol resolution across x86/ARM/PPC/etc., then applies in-place or via code caves with JMP trampolines. It handles precise overwrites, NOP padding, reliable undos via persistent history, and even scans for caves in executable segments or ELF .eh_frame sections. Users get live previews, strategy detection (in-place vs. cave), and Ctrl+Shift+P hotkey for quick patching in reverse engineering workflows.

Why is it gaining traction?

Unlike manual byte edits or brittle scripts, PatchEx auto-resolves IDA symbols to RIP-relative on x64, fixes IDA syntax quirks for Keystone assembly, and warns on rel32 overflows—saving hours on complex patches. The cave scanner filters clean NOP/INT3/zero runs (or overwritable metadata), with rel32 distance checks and content analysis to avoid data corruption. Developers love the undo-all button and history tab for safe experimentation, plus bytes mode for hex dumps without ASM.

Who should use this?

Reverse engineers fixing binaries, vuln researchers prototyping exploits, CTF/AWDP players needing quick shellcode injection, or anyone modding firmware in IDA Pro. Ideal for x64/ARM analysis where caves are scarce and manual JMP math sucks.

Verdict

Grab it if you live in IDA Pro—solid for targeted patching despite 19 stars and 1.0% credibility score; docs are README-only but code is clean Python. Still early; test on backups until more adoption.

(187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.