arphanetx / MonocleLinks
Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password strings, vulnerabilities, etc.
☆162Updated last year
Alternatives and similar repositories for Monocle
Users that are interested in Monocle are comparing it to the libraries listed below
Sorting:
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 4 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆90Updated last week
- eBPF Memory Dump Tool☆85Updated 2 weeks ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 2 months ago
- Python Command-Line Ghidra MCP☆93Updated last week
- FLARE Team's Binary Navigator☆277Updated last month
- A very simple open source implementation of Google's Project Naptime☆169Updated 5 months ago
- A tool for firmware cartography☆158Updated 3 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆113Updated 2 months ago
- ☆104Updated 8 months ago
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆364Updated 2 years ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆69Updated 3 weeks ago
- Automated vulnerability discovery and annotation☆67Updated last year
- Open Source eBPF Malware Analysis Framework☆49Updated 10 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- SAST + LLM Interprocedural Context Extractor☆103Updated 3 weeks ago
- Ghidra scripts for recovering string definitions in Go binaries☆118Updated 10 months ago
- MCP for Pwn☆113Updated last week
- ☆109Updated 2 years ago
- 🤖🏴☠️ radare2 plugin for GPT-4 🦜. Solve crackmes automatically 🪄☆277Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆163Updated 10 months ago
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆64Updated last week
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆51Updated 10 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆50Updated 10 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆122Updated 3 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆331Updated this week
- ☆49Updated 10 months ago
- RevEng.AI Ghidra Plugin☆126Updated this week
- Comprehensive toolkit for Ghidra headless.☆359Updated 4 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆203Updated 11 months ago