arphanetx / MonocleLinks
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password strings, vulnerabilities, etc.
☆165Updated last year
Alternatives and similar repositories for Monocle
Users that are interested in Monocle are comparing it to the libraries listed below
Sorting:
- eBPF Memory Dump Tool☆99Updated 5 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆98Updated 7 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆119Updated this week
- A tool for firmware cartography☆165Updated 2 months ago
- FLARE Team's Binary Navigator☆304Updated last month
- A very simple open source implementation of Google's Project Naptime☆184Updated 10 months ago
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆283Updated 2 months ago
- Python Command-Line Ghidra MCP☆193Updated this week
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆127Updated 7 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆73Updated 9 months ago
- Automated vulnerability discovery and annotation☆68Updated last year
- Automatic Exploit Generation with LLMs☆499Updated last week
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆370Updated 2 years ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆81Updated 2 weeks ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆104Updated this week
- Ghidra scripts for recovering string definitions in Go binaries☆127Updated 2 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆171Updated last year
- ☆113Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated 2 months ago
- Userland exec PoC to be used as attack vector technique☆94Updated 3 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆138Updated 8 months ago
- SAST + LLM Interprocedural Context Extractor☆176Updated 3 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆58Updated last year
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆345Updated last week
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆85Updated last year
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆143Updated 3 years ago
- Open Source eBPF Malware Analysis Framework☆54Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 11 months ago
- ☆84Updated last year
- A powerful Python library and CLI tool for parsing, analyzing, and manipulating YARA rules through Abstract Syntax Tree (AST) representat…☆51Updated last month