Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM
☆99Jun 20, 2025Updated 8 months ago
Alternatives and similar repositories for golem
Users that are interested in golem are comparing it to the libraries listed below
Sorting:
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆283Dec 2, 2025Updated 3 months ago
- Experiments with Google Gemini's Vision capabilities for LLM driven/aided web navigation and desktop manipulation☆31Jan 22, 2025Updated last year
- ☆28Nov 30, 2024Updated last year
- ☆26Nov 8, 2024Updated last year
- Group Policy Objects manipulation and exploitation framework☆292Dec 7, 2025Updated 2 months ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆40Jul 29, 2025Updated 7 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- ☆22Dec 1, 2025Updated 3 months ago
- HackSysExtremeVulnerableDriver exploits for latest Windows 10 version☆26Jan 13, 2026Updated last month
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.☆22Jun 24, 2025Updated 8 months ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 3 months ago
- ☆11Dec 19, 2024Updated last year
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- Vulnerability management tool that provides Buildroot SBOM generation and CVE Analysis of target images.☆11Jan 2, 2026Updated 2 months ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Mar 15, 2025Updated 11 months ago
- LPE / RCE Exploits for various vulnerable "Bloatware" products☆84Aug 5, 2025Updated 6 months ago
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Dec 20, 2025Updated 2 months ago
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- For V8CTF M122☆14Aug 25, 2024Updated last year
- Sample demo to show case Pulumi Automation API in a nextjs project☆12Apr 21, 2022Updated 3 years ago
- A cmake template for crystal palace☆39Dec 20, 2025Updated 2 months ago
- ☆16Jan 2, 2025Updated last year
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- ☆17Jan 9, 2025Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆186Mar 14, 2025Updated 11 months ago
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- PoC to tunnel via AWS Short-Message-Queues☆24Jun 21, 2025Updated 8 months ago
- ☆31Feb 28, 2025Updated last year
- Repository for Ludus french templates☆21Updated this week
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Code lifting for executing a visionOS library os macOS using QBDL and QBDI☆21Sep 30, 2024Updated last year
- ☆51Jun 28, 2025Updated 8 months ago
- Make your programs stealthier🐝☆202Jun 12, 2025Updated 8 months ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Jan 5, 2026Updated last month
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆274Sep 16, 2025Updated 5 months ago