JetP1ane / CallistoLinks
Callisto - An Intelligent Binary Vulnerability Analysis Tool
☆368Updated 2 years ago
Alternatives and similar repositories for Callisto
Users that are interested in Callisto are comparing it to the libraries listed below
Sorting:
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆546Updated last year
- A collection of my Semgrep rules to facilitate vulnerability research.☆773Updated this week
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- Fuzz anything with Program Environment Fuzzing☆398Updated 11 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆280Updated this week
- ASLR bypass without infoleak☆166Updated 4 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆654Updated 8 months ago
- Comprehensive toolkit for Ghidra headless.☆362Updated 9 months ago
- Quarkslab conference talks☆312Updated 2 months ago
- PASTIS: Collaborative Fuzzing Framework☆166Updated 3 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated 2 months ago
- Code Coverage Exploration Plugin for Ghidra☆372Updated last year
- A structure-aware HTTP fuzzing library☆217Updated last week
- MCP for Pwn☆197Updated last month
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆371Updated 2 months ago
- Python Command-Line Ghidra MCP☆176Updated 2 weeks ago
- ☆98Updated 4 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆65Updated 3 years ago
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- ☆115Updated last year
- ☆330Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- ☆112Updated last year
- ☆546Updated last month
- ☆342Updated 3 years ago
- A source code static analysis platform for AppSec enthusiasts.☆265Updated last month
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆174Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆125Updated 2 months ago