AI-Assisted Reverse Engineering with Ghidra
☆102Mar 20, 2026Updated 3 weeks ago
Alternatives and similar repositories for ai-reverse-engineering
Users that are interested in ai-reverse-engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC plugin for jadx-gui to evaluate methods and update decompiler output☆24Nov 24, 2025Updated 4 months ago
- PE .exe packer and manual loader for Windows with compression, encryption, and much more☆56Sep 5, 2025Updated 7 months ago
- ☆28May 14, 2025Updated 11 months ago
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆57Updated this week
- 还原脚本及一些测试代码☆10Sep 29, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆24Jun 16, 2024Updated last year
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- A Reverse Engineering Assistant leveraging Retrieval-Augmented Generation (RAG) and the LLaMA-3.1-8B-Instant Large Language Model (LLM). …☆38Nov 26, 2025Updated 4 months ago
- SPL Token/ NFT issue tool on solana blockchain by React☆10Oct 27, 2025Updated 5 months ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- x64dbg plugin to log executions☆17Aug 28, 2023Updated 2 years ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 2 months ago
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆11Jun 19, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- [DEPRECATED] Attempts to convert a Flux lora to a Chroma lora☆20Nov 9, 2025Updated 5 months ago
- A (SLEIGH) disassembler that supports multiple architectures☆92Apr 30, 2022Updated 3 years ago
- Plugin for JADX to integrate MCP server☆1,723Mar 29, 2026Updated 2 weeks ago
- Implementation of the paper "Hallucination Detection in LLMs Using Spectral Features of Attention Maps"☆13Oct 18, 2025Updated 5 months ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- ☆16Mar 5, 2024Updated 2 years ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆59Mar 7, 2026Updated last month
- A crawler-focused forward proxy with fingerprint spoofing☆17Nov 19, 2025Updated 4 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- javascript undetected automation, based on playwright without the detection☆18Feb 19, 2026Updated last month
- Phone Radar is a simple tool that allows you to scan mobile phone numbers and display the provider tied to the number, can be usefull to …☆14Dec 13, 2024Updated last year
- ☆18Sep 12, 2025Updated 7 months ago
- XrefsExt plugin for IDA Pro(idapython,ida plugin,ida plugins)☆26Nov 13, 2024Updated last year
- Galago extracts encryption keys from ARM64 Android native libraries through controlled emulation.☆24Jan 23, 2026Updated 2 months ago
- Minimal ELF inspector written in C for quick binary layout inspection☆29Jan 9, 2026Updated 3 months ago
- MQTT Security Testing☆24Jul 26, 2022Updated 3 years ago
- ☆22Apr 14, 2025Updated last year
- iOS SSL Bypass & Real-Time Traffic Monitor – A Frida-based script for bypassing SSL pinning and monitoring network traffic on iOS apps in…☆21Mar 11, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆602Nov 6, 2025Updated 5 months ago
- 🌳 Link in bio, hacker style.☆12Jan 12, 2026Updated 3 months ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆23Mar 11, 2025Updated last year
- circumventing application tweak detection☆15Aug 4, 2024Updated last year
- Share the schematic and layout (KiCad) for DIY USB2.0 4-PORTS HUB with CH334U☆14Mar 9, 2023Updated 3 years ago
- reverse engineering SynthID for text☆37Dec 23, 2025Updated 3 months ago
- 🔓 Decrypt strings from a .NET module dump protected by Themida, the advanced windows software protection system☆19Mar 20, 2021Updated 5 years ago