arphanetx / MonocleLinks
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password strings, vulnerabilities, etc.
☆165Updated last year
Alternatives and similar repositories for Monocle
Users that are interested in Monocle are comparing it to the libraries listed below
Sorting:
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆95Updated 6 months ago
- eBPF Memory Dump Tool☆97Updated 4 months ago
- Python Command-Line Ghidra MCP☆165Updated last week
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 8 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudocode analysis.☆111Updated last week
- FLARE Team's Binary Navigator☆298Updated 3 weeks ago
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆274Updated last month
- A very simple open source implementation of Google's Project Naptime☆179Updated 9 months ago
- A tool for firmware cartography☆161Updated 3 weeks ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆125Updated 6 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆75Updated 4 months ago
- ☆56Updated last year
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆119Updated 9 months ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆367Updated 2 years ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated last month
- ☆110Updated 11 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆102Updated this week
- Ghidra scripts for recovering string definitions in Go binaries☆125Updated last month
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆338Updated last week
- Binary Exploitation Phrack CTF Challenge☆139Updated 4 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 5 months ago
- ELFEN: Automated Linux Malware Analysis Sandbox☆132Updated 4 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆53Updated last year
- ☆114Updated 3 years ago
- Userland exec PoC to be used as attack vector technique☆93Updated 2 months ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated 2 months ago
- MCP for Pwn☆183Updated last month