JetP1ane / CallistoLinks
Callisto - An Intelligent Binary Vulnerability Analysis Tool
☆368Updated 2 years ago
Alternatives and similar repositories for Callisto
Users that are interested in Callisto are comparing it to the libraries listed below
Sorting:
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆546Updated last year
- A collection of my Semgrep rules to facilitate vulnerability research.☆765Updated this week
- Fuzz anything with Program Environment Fuzzing☆396Updated 11 months ago
- An automatic Blind ROP exploitation tool☆206Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆279Updated this week
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆650Updated 7 months ago
- Comprehensive toolkit for Ghidra headless.☆362Updated 8 months ago
- Code Coverage Exploration Plugin for Ghidra☆372Updated last year
- ☆115Updated last year
- Quarkslab conference talks☆309Updated last month
- ASLR bypass without infoleak☆164Updated 4 years ago
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆370Updated last month
- PASTIS: Collaborative Fuzzing Framework☆163Updated 2 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆165Updated last year
- ChatWithBinary: Advanced AI-powered binary analysis tool leveraging OpenAI & LangChain (2023)☆379Updated last year
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated last month
- ☆330Updated last year
- ☆109Updated 11 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- A structure-aware HTTP fuzzing library☆217Updated last month
- ☆97Updated 4 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆125Updated last month
- EMBArk - The firmware security scanning environment☆367Updated 3 weeks ago
- IDApython Scripts for Analyzing Golang Binaries☆659Updated last year
- ☆207Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆723Updated 3 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆522Updated 6 months ago
- MCP for Pwn☆179Updated 3 weeks ago