IndAlok / rzwebLinks
A complete browser-based reverse engineering platform built on Rizin, running entirely client-side via WebAssembly.
☆148Updated this week
Alternatives and similar repositories for rzweb
Users that are interested in rzweb are comparing it to the libraries listed below
Sorting:
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆288Updated 5 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆265Updated 2 weeks ago
- Integrate LLM models directly into Ghidra for automated code rewrite and analysis.☆224Updated last month
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆76Updated 3 weeks ago
- The most complete code auditing platform with thousands of real-world challenges☆135Updated 7 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated last month
- MITM proxy for TCP/TLS/DTLS/UDP traffic, with STARTTLS, IoT, Thick Client and more.☆634Updated last week
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆120Updated 4 months ago
- Detection Script for MongoBleed Exploitation☆75Updated 2 weeks ago
- ☆185Updated 2 months ago
- An archive of 0day.today exploits☆331Updated 5 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 9 months ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆193Updated 2 months ago
- macOS persistence mechanism scanner with code signature verification and timeline tracking.☆188Updated last month
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆332Updated this week
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 4 months ago
- Search engine for CTF writeups with instant results.☆151Updated 10 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆77Updated 9 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 9 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆285Updated last month
- ☆236Updated 3 weeks ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆156Updated last month
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆132Updated 3 weeks ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆107Updated 5 months ago
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆226Updated this week
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆111Updated 2 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated last month
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆339Updated last week
- ☆174Updated last month