Callisto - An Intelligent Binary Vulnerability Analysis Tool
☆371Jul 24, 2023Updated 2 years ago
Alternatives and similar repositories for Callisto
Users that are interested in Callisto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆330Jun 20, 2024Updated last year
- A collection of my Semgrep rules to facilitate vulnerability research.☆799Mar 9, 2026Updated 2 weeks ago
- An automatic Blind ROP exploitation tool☆208Jun 9, 2023Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆290Jan 31, 2026Updated last month
- Code Coverage Exploration Plugin for Ghidra☆378Jul 19, 2024Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,327Apr 10, 2025Updated 11 months ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆660May 13, 2025Updated 10 months ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- Whole-Program Reverse Engineering with GPT-3☆383Dec 31, 2022Updated 3 years ago
- A full-featured open-source Wi-Fi fuzzer☆198Sep 30, 2025Updated 5 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 4 months ago
- Python Command-Line Ghidra Binary Diffing Engine☆745Sep 25, 2025Updated 5 months ago
- EMBA - The firmware security analyzer☆3,403Mar 16, 2026Updated last week
- A collection of my weggli patterns to facilitate vulnerability research.☆155Mar 9, 2026Updated 2 weeks ago
- A tool for firmware cartography☆165Dec 8, 2025Updated 3 months ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- ☆187Nov 29, 2023Updated 2 years ago
- ☆82Sep 3, 2021Updated 4 years ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆357Mar 16, 2026Updated last week
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- ☆21Sep 25, 2023Updated 2 years ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆358Dec 14, 2023Updated 2 years ago
- IDA plugin which queries language models to speed up reverse-engineering☆3,383Feb 1, 2026Updated last month
- A gdb for fuzzing☆22Nov 26, 2021Updated 4 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆191Feb 24, 2026Updated 3 weeks ago
- AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)☆996May 26, 2025Updated 9 months ago
- Comprehensive toolkit for Ghidra headless.☆363Apr 17, 2025Updated 11 months ago
- Report and exploit of CVE-2023-36427☆90Nov 22, 2023Updated 2 years ago
- ☆198Jan 18, 2023Updated 3 years ago
- Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware☆423Sep 18, 2021Updated 4 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,299Mar 2, 2026Updated 3 weeks ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Mar 27, 2024Updated last year
- ☆94Mar 31, 2025Updated 11 months ago
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,146Sep 10, 2023Updated 2 years ago