WinMin / ida-pro-mcpView external linksLinks
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
☆43Feb 7, 2026Updated last week
Alternatives and similar repositories for ida-pro-mcp
Users that are interested in ida-pro-mcp are comparing it to the libraries listed below
Sorting:
- Let sliver use msf payload!☆25Mar 23, 2025Updated 10 months ago
- ☆21Apr 6, 2025Updated 10 months ago
- The container escape challenge of Be A RWCTFer competition (https://be-a-rwctfer.realworldctf.com/)☆61Mar 20, 2025Updated 10 months ago
- Alleycat plugin by devttys0, ported to IDA 8☆11Jan 15, 2025Updated last year
- A BOF to create a scheduled task using a COM object.☆16Dec 3, 2024Updated last year
- 在原版nps的基础上,增加了nps探测,以及对应的利用方式(如获取cookie,页面等),进行一些简单的二开。未经过大量测试,可能存在bug。☆21Aug 5, 2025Updated 6 months ago
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆10May 17, 2023Updated 2 years ago
- 利用chrome扩展 dump 浏览器cookie https://saucer-man.com/information_security/787.html☆15Sep 9, 2021Updated 4 years ago
- Source code for the DEF CON 33 CTF Finals.☆25Aug 26, 2025Updated 5 months ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated last month
- 可以指定状态码和标题以排除不想要的数据,支持从管道符传入参数,根据cms类型来做总结输出☆14Nov 19, 2024Updated last year
- The prototype implementation of our USENIX 2023 paper☆15Apr 25, 2023Updated 2 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- xiaomi lua anti☆33Jul 8, 2020Updated 5 years ago
- 基于Go和YARA规则 对windows进程和文件进行检测☆19Sep 20, 2024Updated last year
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆71Apr 25, 2025Updated 9 months ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- ☆19Jul 21, 2025Updated 6 months ago
- A SKILL.md for ipsw☆37Jan 27, 2026Updated 2 weeks ago
- kill windows log☆45Mar 26, 2024Updated last year
- A .NET assembly tracer using Harmony for runtime method interception.☆50Oct 24, 2025Updated 3 months ago
- A script for installing and switching multiple java versions on Linux x86_64, suitable for code audit workers.☆21Mar 2, 2024Updated last year
- ☆18Dec 25, 2024Updated last year
- 一款简单的后渗透免杀加载器,Bypass AV/EDR☆90Oct 26, 2024Updated last year
- Java Inline ASM Library (一个Java内联汇编的库,可以让你在普通Java代码中插入任意的JVM指令,实现类似内联汇编的功能)☆26Dec 5, 2022Updated 3 years ago
- Chameleon is a polymorphic engine for x86_64 position independent shellcode that has been created out of the need to evade signature-base…☆47Oct 3, 2025Updated 4 months ago
- A beginner-friendly collection of Rust notes focused on Red Team Tooling • Malware Development • Systems Programming • Rust Fundamentals☆58Nov 24, 2025Updated 2 months ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆63Jan 13, 2026Updated last month
- 免杀生成aspx的脚本☆26Sep 22, 2024Updated last year
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated last month
- RPC 调用添加ssp扩展dump lsass☆24Aug 16, 2022Updated 3 years ago
- This is a third party agent for Havoc C2 written in golang.☆58Jan 16, 2024Updated 2 years ago
- ☆20Jan 25, 2022Updated 4 years ago
- 一款使用Yaml定义搜索规则来搜索Class的工具☆108Aug 2, 2023Updated 2 years ago
- ☆28Feb 3, 2022Updated 4 years ago
- This project is move advanced version of https://github.com/WKL-Sec/HiddenDesktop☆50Jan 11, 2026Updated last month
- ☆30Aug 30, 2022Updated 3 years ago