arphanetx / Monocle
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password strings, vulnerabilities, etc.
☆160Updated last year
Alternatives and similar repositories for Monocle:
Users that are interested in Monocle are comparing it to the libraries listed below
- eBPF Memory Dump Tool☆64Updated 2 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆69Updated this week
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆100Updated last month
- FLARE Team's Binary Navigator☆252Updated last month
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆364Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆153Updated 5 months ago
- A very simple open source implementation of Google's Project Naptime☆142Updated last month
- ☆94Updated 4 months ago
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆388Updated this week
- A tool for firmware cartography☆147Updated 4 months ago
- ☆114Updated this week
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆188Updated 7 months ago
- ☆101Updated 2 years ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆44Updated 6 months ago
- ☆318Updated 10 months ago
- An LLM extension for Ghidra to enable AI assistance in RE.☆191Updated 3 weeks ago
- Python tool to check rootkits in Windows kernel☆195Updated 2 months ago
- Automated vulnerability discovery and annotation☆67Updated 9 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆46Updated last week
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆83Updated 11 months ago
- ☆89Updated 2 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated last year
- ELFEN: Automated Linux Malware Analysis Sandbox☆124Updated 9 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Open Source eBPF Malware Analysis Framework☆48Updated 6 months ago
- Userland exec PoC to be used as attack vector technique☆85Updated 3 months ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆315Updated 3 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆46Updated 6 months ago
- Repository for the code snippets from the AllThingsIDA video channel☆104Updated 4 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆117Updated last week