clearbluejar / pyghidra-mcpLinks
Python Command-Line Ghidra MCP
☆114Updated last week
Alternatives and similar repositories for pyghidra-mcp
Users that are interested in pyghidra-mcp are comparing it to the libraries listed below
Sorting:
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 3 months ago
- Binary Exploitation Phrack CTF Challenge☆63Updated last month
- Leveraging patch diffing to discover new vulnerabilities☆134Updated 11 months ago
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆83Updated 2 weeks ago
- ☆53Updated 11 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆162Updated last year
- Binary Exploitation Phrack CTF Challenge☆132Updated last month
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆188Updated this week
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- ☆112Updated last month
- MCP for Pwn☆118Updated 3 weeks ago
- ☆79Updated last year
- ☆104Updated 8 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 5 months ago
- Reverse engineering assistant that uses a locally running LLM to aid with pseudo-code analysis.☆96Updated this week
- ☆33Updated 8 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆85Updated 9 months ago
- A tool for firmware cartography☆158Updated 3 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆164Updated 10 months ago
- ☆24Updated last month
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆82Updated this week
- Research browsers☆43Updated 4 months ago
- PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and t…☆38Updated this week
- ☆93Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆89Updated 6 months ago
- Userland exec PoC to be used as attack vector technique☆88Updated 3 weeks ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- SAST + LLM Interprocedural Context Extractor☆113Updated last month