20urc3 / golemLinks
Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM
☆89Updated last month
Alternatives and similar repositories for golem
Users that are interested in golem are comparing it to the libraries listed below
Sorting:
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆77Updated this week
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- eBPF Memory Dump Tool☆82Updated last month
- Open Source eBPF Malware Analysis Framework☆48Updated 9 months ago
- Leveraging patch diffing to discover new vulnerabilities☆127Updated 9 months ago
- ☆23Updated 6 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆81Updated last month
- ☆47Updated 9 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 5 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- ☆74Updated last year
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆78Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 3 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆107Updated last month
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆160Updated 8 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 4 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆129Updated last month
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆117Updated last year
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆184Updated 2 weeks ago
- ☆77Updated last year
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 7 months ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- ☆71Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆87Updated 4 months ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆46Updated 3 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆163Updated last year
- ☆19Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 7 months ago
- ☆88Updated 5 months ago