Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.
☆126Mar 2, 2026Updated this week
Alternatives and similar repositories for oneiromancer
Users that are interested in oneiromancer are comparing it to the libraries listed below
Sorting:
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆104Feb 23, 2026Updated last week
- Reverse engineering assistant that extracts strings and related pseudocode from a binary file.☆99Feb 23, 2026Updated last week
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆109Feb 23, 2026Updated last week
- WPAUDIT: Advanced WordPress security auditing suite & vulnerability scanner. Automates pentesting with Nmap, WPScan, Nuclei, SQLMap. Comp…☆34May 27, 2025Updated 9 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆131Mar 26, 2025Updated 11 months ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 10 months ago
- Pishi is a code coverage tool like kcov for macOS.☆75Apr 17, 2025Updated 10 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 3 months ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- Some V8 n-day exploits that I've written☆50Updated this week
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and rever…☆49Jan 9, 2026Updated last month
- HN Security's advisories.☆22Nov 7, 2025Updated 3 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 7 months ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Nov 30, 2025Updated 3 months ago
- Ghidra decompiler plugin for LLDB☆110Feb 15, 2026Updated 2 weeks ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 10 months ago
- Security tool against dependency typosquatting attacks☆54Feb 25, 2026Updated last week
- Web File Manager☆11Aug 21, 2025Updated 6 months ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated last month
- Hex-Rays CLI (HCLI)☆52Updated this week
- #INFILTRATE19 raptor's party pack.☆33Nov 10, 2025Updated 3 months ago
- Redirect spawned iOS application stdout and stderr to pty☆29Jan 29, 2025Updated last year
- ☆28May 9, 2022Updated 3 years ago
- SBOM Move - Automate build and transfer of SBOMs across systems☆25Updated this week
- ☆11Feb 23, 2025Updated last year
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated last year
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 4 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆68Updated this week
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 7 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- ☆38May 31, 2024Updated last year
- ☆50Dec 20, 2025Updated 2 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated 11 months ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 10 months ago