SourceDiver42 / Ghidra-ChatGPTLinks
☆94Updated 2 years ago
Alternatives and similar repositories for Ghidra-ChatGPT
Users that are interested in Ghidra-ChatGPT are comparing it to the libraries listed below
Sorting:
- Brings the power of ChatGPT to Ghidra!☆154Updated 11 months ago
- Comprehensive toolkit for Ghidra headless.☆358Updated 2 months ago
- ☆123Updated last year
- Binary Golf Grand Prix☆112Updated last year
- Ghidra scripts for recovering string definitions in Go binaries☆116Updated 8 months ago
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functions☆129Updated 11 months ago
- Make your Ghidra Lazy!☆152Updated 4 years ago
- Binary Golf Grand Prix☆60Updated 4 months ago
- Ghidra scripts for malware analysis☆101Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆174Updated 2 years ago
- A framework for creating smart cards (ICC-based cards with contacts).☆133Updated 11 months ago
- Hands-on workshop on the basics of hardware hacking.☆122Updated last year
- A tool for firmware cartography☆156Updated last month
- RevEng.AI Ghidra Plugin☆118Updated this week
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆105Updated 2 weeks ago
- Binary Golf Examples and Resources☆255Updated last year
- Write ups for Ph0wn CTF☆42Updated 7 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆147Updated 2 years ago
- malware analysis scripts for Ghidra☆79Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆136Updated 2 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆259Updated 7 months ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆178Updated last year
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆26Updated 2 years ago
- ☆204Updated 8 months ago
- ☆84Updated 7 years ago
- This project demonstrates how a convolutional neural network can be used to detect the boundaries of a function in compiled code☆137Updated 2 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆168Updated last year
- A repo for TPM sniffing greatness☆231Updated 2 weeks ago