0xdea / oneiromancerLinks
Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.
☆101Updated this week
Alternatives and similar repositories for oneiromancer
Users that are interested in oneiromancer are comparing it to the libraries listed below
Sorting:
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆92Updated 4 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆89Updated this week
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆74Updated this week
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- eBPF Memory Dump Tool☆87Updated last month
- MCP for Pwn☆129Updated last month
- Automated vulnerability discovery and annotation☆67Updated last year
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆251Updated 2 weeks ago
- A headless, extendable, multi-session, IDA Pro MCP framework.☆74Updated 3 weeks ago
- Python Command-Line Ghidra MCP☆129Updated last week
- Research browsers☆43Updated 4 months ago
- Rust Library Recognition Project for Rust Malware by the MSTIC-MIRAGE Team☆277Updated last week
- ☆54Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 2 months ago
- MCP stdio server for radare2☆100Updated this week
- Binary Exploitation Phrack CTF Challenge☆134Updated 2 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Binary Exploitation Phrack CTF Challenge☆65Updated 2 months ago
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆77Updated last week
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆29Updated 2 months ago
- Userland exec PoC to be used as attack vector technique☆93Updated last month
- ☆105Updated 9 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆72Updated 2 months ago
- Security Blogs - A simple aggregator for security news/blog☆24Updated 2 weeks ago
- SAST + LLM Interprocedural Context Extractor☆118Updated 2 months ago
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆80Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 5 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆52Updated 11 months ago
- ☆16Updated last year