JetP1ane / CallistoLinks
Callisto - An Intelligent Binary Vulnerability Analysis Tool
☆370Updated 2 years ago
Alternatives and similar repositories for Callisto
Users that are interested in Callisto are comparing it to the libraries listed below
Sorting:
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆547Updated 2 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆779Updated last week
- Quarkslab conference talks☆312Updated 3 months ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆659Updated 8 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Updated last year
- Fuzz anything with Program Environment Fuzzing☆397Updated last year
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆372Updated 2 months ago
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆284Updated last week
- Comprehensive toolkit for Ghidra headless.☆363Updated 9 months ago
- Code Coverage Exploration Plugin for Ghidra☆374Updated last year
- ☆116Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Updated 2 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆89Updated 2 months ago
- ☆98Updated 4 years ago
- PASTIS: Collaborative Fuzzing Framework☆166Updated 3 months ago
- ☆330Updated last year
- A tool for firmware cartography☆165Updated 2 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆523Updated 7 months ago
- IDApython Scripts for Analyzing Golang Binaries☆663Updated last year
- ☆113Updated last year
- This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices☆201Updated 3 weeks ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆216Updated last month
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Updated 7 months ago
- Slides & Hands-on for the reverse engineering workshop☆184Updated 3 years ago
- ☆215Updated last year
- FLARE Team's Binary Navigator☆304Updated last month