Autonomous reverse engineering agent: dual-LLM loop, 11-signal parity engine, Ghidra backend
☆79Feb 19, 2026Updated last month
Alternatives and similar repositories for auto-re-agent
Users that are interested in auto-re-agent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆20Dec 18, 2025Updated 3 months ago
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆30Jun 9, 2025Updated 10 months ago
- Hunt for AI coding artifacts containing secrets.☆56Mar 30, 2026Updated last week
- Curated list of ransomware-related resources; awesome style.☆32Jan 17, 2025Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Peaks based drum synthesizer.☆16Feb 14, 2022Updated 4 years ago
- Cybersecurity Psychology Framework☆20Feb 22, 2026Updated last month
- Sample Random GitHub Repositories☆12Dec 27, 2025Updated 3 months ago
- The code I write in my blog☆86Feb 21, 2026Updated last month
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last week
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- ☆11Apr 1, 2025Updated last year
- information about retrieving TLD zone data☆53Mar 8, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Security Blogs - A simple aggregator for security news/blog☆25Mar 31, 2026Updated last week
- "Talking PD" article code repository☆14Jun 23, 2023Updated 2 years ago
- GFPGAN face reconstruction with ncnn on a bare Raspberry Pi☆14Jan 4, 2023Updated 3 years ago
- Maltego Local Transform to use Hybrid Analysis Public API - https://www.hybrid-analysis.com/apikeys/info☆12Sep 7, 2018Updated 7 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- ☆11Mar 22, 2016Updated 10 years ago
- OpenRISC 1000 processor module for IDA 7.x☆13Feb 13, 2024Updated 2 years ago
- Implementation of ITaskHandler in C++☆14Feb 11, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆13Oct 22, 2023Updated 2 years ago
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Blender importer for DML and DPL files created by the Dagor Asset Explorer.☆14Aug 20, 2023Updated 2 years ago
- ThunderCls's x64dbg Acid Lime Theme remixed☆12Jul 15, 2022Updated 3 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Aug 2, 2021Updated 4 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- Decrypt Mach-O executables using injection☆20May 23, 2019Updated 6 years ago
- ☆14Dec 27, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆16Aug 30, 2020Updated 5 years ago
- WIP Custom ARM UEFI firmware for Lumia535☆10Mar 28, 2020Updated 6 years ago
- Baremetal softwares for TrivialMIPS platform☆11Aug 12, 2019Updated 6 years ago
- Audit and test security vulnerabilities or simply wreak chaos upon your ROS system☆11Jul 12, 2018Updated 7 years ago
- ☆10Apr 28, 2020Updated 5 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago