weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interesting functionality in large codebases.
☆19Jun 6, 2024Updated last year
Alternatives and similar repositories for weggli-enhance
Users that are interested in weggli-enhance are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collections of patterns for weggli to find nice bugs☆21Nov 30, 2023Updated 2 years ago
- ☆21Sep 10, 2024Updated last year
- Utility for sniffing SSL/TLS encrypted traffic on a darwin-based platforms.☆27Jan 29, 2024Updated 2 years ago
- Description of Apple's LEAP ISA☆16Nov 21, 2022Updated 3 years ago
- An OpenAI-powered triage bot for a slack support channel designed to tag oncalls, prioritize issues, suggest solutions, and streamline co…☆12Jun 11, 2025Updated 9 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Statistics from our binary transformation framework☆12Jan 16, 2025Updated last year
- A PoC to trigger CVE-2023-5217 from the Browser WebCodecs or MediaRecorder interface.☆17Oct 11, 2023Updated 2 years ago
- ☆20May 24, 2021Updated 4 years ago
- SMT Modeling and Configurable Program Analysis for Ghidra's PCODE☆35Updated this week
- IDA Database Parser for Rust☆26Sep 13, 2024Updated last year
- ☆15Mar 11, 2026Updated 2 weeks ago
- Hopefully an insightful XPC tracer that helps vulerability research by tracing server and client call stacks☆20Jul 19, 2022Updated 3 years ago
- ☆51Mar 23, 2018Updated 8 years ago
- The datasets and source code of the NDSS 2025 paper《BinEnhance: An Enhancement Framework Based on External Environment Semantics for Bina…☆30Nov 13, 2025Updated 4 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆17Aug 31, 2023Updated 2 years ago
- Official implementation of the paper "HermesBDD: A Multi-Core and Multi-Platform Binary Decision Diagram Package" accepted @ DDECS 2023.☆13Jul 11, 2025Updated 8 months ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- CryptexManager is an open-source replacement for cryptexctl☆19May 16, 2022Updated 3 years ago
- Detailed Airplay Protocol Specification☆26Jul 8, 2022Updated 3 years ago
- CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same networ…☆74Sep 23, 2020Updated 5 years ago
- Apple Hypervisor.framework bindings for Golang☆36Jan 12, 2026Updated 2 months ago
- Objective-C runtime tracing tool☆40Sep 15, 2023Updated 2 years ago
- Framework to reverse engineer binaries and evaluate similarities across a large collections of files. Uses sector hashing and data flow …☆15May 23, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Python API to VarBERT, a BERT based model for suggesting variable names in decompiled code.☆54Feb 23, 2026Updated last month
- ☆32Apr 1, 2022Updated 3 years ago
- Tool to patch the ASLR slide generation in the kernel to disable user-land ASLR on 32-bit iOS☆32Dec 6, 2020Updated 5 years ago
- Exploit for CVE-2023-32364☆23Sep 26, 2023Updated 2 years ago
- An IDA plugin that eases reversing of binaries that have been code-size-optimized with function outlining☆225Dec 31, 2024Updated last year
- My collection of PoCs☆26Nov 9, 2023Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Aug 5, 2022Updated 3 years ago
- ☆13Feb 24, 2024Updated 2 years ago
- Runtime code injection suite for exploring OS X process security☆40Jun 1, 2009Updated 16 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Visualise the Data Flow Graph of the PCODE at all stages in the decompilation process☆59Apr 5, 2025Updated 11 months ago
- IDB parser☆26Nov 24, 2025Updated 4 months ago
- link a linux ELF .so library into memory with python and call functions in it, even if you're not on linux☆10Feb 5, 2020Updated 6 years ago
- Code Continuity Analysis Framework☆23Mar 3, 2025Updated last year
- Slides for presentations held at conferences☆48Jan 2, 2023Updated 3 years ago
- An implementation for Sugyama's algorithm for displaying a layered graph.☆25Sep 21, 2025Updated 6 months ago
- yara and radare2, better together☆27Mar 23, 2026Updated last week