Callisto - An Intelligent Binary Vulnerability Analysis Tool
☆371Jul 24, 2023Updated 2 years ago
Alternatives and similar repositories for Callisto
Users that are interested in Callisto are comparing it to the libraries listed below
Sorting:
- ☆330Jun 20, 2024Updated last year
- A collection of my Semgrep rules to facilitate vulnerability research.☆798Feb 17, 2026Updated last week
- An automatic Blind ROP exploitation tool☆208Jun 9, 2023Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆289Jan 31, 2026Updated last month
- Code Coverage Exploration Plugin for Ghidra☆376Jul 19, 2024Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆127Nov 15, 2025Updated 3 months ago
- A full-featured open-source Wi-Fi fuzzer☆197Sep 30, 2025Updated 5 months ago
- Python Command-Line Ghidra Binary Diffing Engine☆740Sep 25, 2025Updated 5 months ago
- EMBA - The firmware security analyzer☆3,371Updated this week
- ☆27Aug 18, 2023Updated 2 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆191Updated this week
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆356Dec 14, 2023Updated 2 years ago
- ☆198Jan 18, 2023Updated 3 years ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- cwe_checker finds vulnerable patterns in binary executables☆1,324Apr 10, 2025Updated 10 months ago
- ☆82Sep 3, 2021Updated 4 years ago
- Whole-Program Reverse Engineering with GPT-3☆383Dec 31, 2022Updated 3 years ago
- Comprehensive toolkit for Ghidra headless.☆363Apr 17, 2025Updated 10 months ago
- ☆187Nov 29, 2023Updated 2 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆548Feb 1, 2024Updated 2 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆658May 13, 2025Updated 9 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆355Updated this week
- A tool for firmware cartography☆165Dec 8, 2025Updated 2 months ago
- AFLNet: A Greybox Fuzzer for Network Protocols (https://thuanpv.github.io/publications/AFLNet_ICST20.pdf)☆989May 26, 2025Updated 9 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Mar 27, 2024Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Feb 20, 2026Updated last week
- Zero shot vulnerability discovery using LLMs☆2,506Feb 6, 2025Updated last year
- Report and exploit of CVE-2023-36427☆90Nov 22, 2023Updated 2 years ago
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,293Jan 13, 2026Updated last month
- IDA plugin which queries language models to speed up reverse-engineering☆3,369Feb 1, 2026Updated last month
- Fuzz anything with Program Environment Fuzzing☆398Jan 31, 2025Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆130Dec 19, 2024Updated last year
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,147Sep 10, 2023Updated 2 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆285Mar 5, 2025Updated 11 months ago