Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.
☆127Mar 15, 2026Updated last week
Alternatives and similar repositories for oneiromancer
Users that are interested in oneiromancer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆99Mar 14, 2026Updated last week
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆106Mar 14, 2026Updated last week
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆111Mar 14, 2026Updated last week
- HN Security's advisories.☆22Nov 7, 2025Updated 4 months ago
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆34May 27, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 4 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- ☆16Feb 27, 2026Updated 3 weeks ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆132Mar 26, 2025Updated 11 months ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- NASM macOS translation of the source code listings distributed with the Art of 64-bit Assembly Language book.☆20Nov 10, 2025Updated 4 months ago
- Pishi is a code coverage tool like kcov for macOS.☆76Apr 17, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and rever…☆49Jan 9, 2026Updated 2 months ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- Some V8 n-day exploits that I've written☆53Mar 1, 2026Updated 3 weeks ago
- Web File Manager☆11Aug 21, 2025Updated 7 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆340Mar 15, 2026Updated last week
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆32Nov 10, 2025Updated 4 months ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 6 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆68Mar 6, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 3 months ago
- ☆13Jun 20, 2022Updated 3 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 11 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated 11 months ago
- llvm powered deobfuscation of a vm-based protection☆53Feb 25, 2026Updated last month
- Hex-Rays CLI (HCLI)☆62Mar 10, 2026Updated 2 weeks ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆22Jan 15, 2025Updated last year
- ☆29May 9, 2022Updated 3 years ago
- eBPF Memory Dump Tool☆101Feb 26, 2026Updated 3 weeks ago
- Minimalistic cross-platform mouse jiggler written in Rust.☆24Mar 15, 2026Updated last week
- ☆19May 17, 2025Updated 10 months ago
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- some leaked src code for known and unknown malwares☆23Aug 15, 2025Updated 7 months ago