arphanetx / MonocleLinks
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password strings, vulnerabilities, etc.
☆162Updated last year
Alternatives and similar repositories for Monocle
Users that are interested in Monocle are comparing it to the libraries listed below
Sorting:
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 5 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 3 months ago
- FLARE Team's Binary Navigator☆284Updated 2 months ago
- Python Command-Line Ghidra MCP☆114Updated last week
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆96Updated this week
- eBPF Memory Dump Tool☆86Updated last month
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆113Updated 3 months ago
- A tool for firmware cartography☆158Updated 3 months ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆362Updated 2 years ago
- ☆104Updated 8 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆70Updated last month
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated last year
- A very simple open source implementation of Google's Project Naptime☆169Updated 6 months ago
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆188Updated this week
- Automated vulnerability discovery and annotation☆67Updated last year
- Open Source eBPF Malware Analysis Framework☆51Updated 11 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆52Updated 11 months ago
- ☆109Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆164Updated 10 months ago
- Ghidra scripts for recovering string definitions in Go binaries☆119Updated 10 months ago
- Userland exec PoC to be used as attack vector technique☆88Updated 3 weeks ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆51Updated 10 months ago
- Code Coverage Exploration Plugin for Ghidra☆361Updated last year
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆330Updated this week
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆126Updated 4 months ago
- ☆53Updated 11 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆82Updated this week
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆206Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆116Updated 6 months ago
- Linpmem is a linux memory acquisition tool☆88Updated 3 months ago