arphanetx / MonocleLinks
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password strings, vulnerabilities, etc.
☆162Updated last year
Alternatives and similar repositories for Monocle
Users that are interested in Monocle are comparing it to the libraries listed below
Sorting:
- eBPF Memory Dump Tool☆82Updated 2 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆86Updated last month
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 3 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 2 months ago
- FLARE Team's Binary Navigator☆276Updated 3 weeks ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆68Updated this week
- A very simple open source implementation of Google's Project Naptime☆165Updated 4 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆112Updated last month
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆366Updated 2 years ago
- A tool for firmware cartography☆158Updated 2 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆50Updated 9 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆201Updated 10 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- Open Source eBPF Malware Analysis Framework☆49Updated 10 months ago
- Heavily-modified fork of David Buchanan's dlinject project. Injects arbitrary assembly (or precompiled binary) payloads directly into x86…☆137Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 8 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆161Updated 9 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆126Updated this week
- Userland exec PoC to be used as attack vector technique☆85Updated 6 months ago
- ☆106Updated 2 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆117Updated 9 months ago
- ☆102Updated 7 months ago
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆51Updated 9 months ago
- ☆113Updated last month
- SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆415Updated 2 months ago
- ☆47Updated 10 months ago
- local language model for radare2☆295Updated this week
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆326Updated this week