cyberark / ByteCodeLLMLinks
☆53Updated 10 months ago
Alternatives and similar repositories for ByteCodeLLM
Users that are interested in ByteCodeLLM are comparing it to the libraries listed below
Sorting:
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆49Updated 5 months ago
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆21Updated 11 months ago
- Windows Minidump loader for Ghidra☆29Updated 3 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆18Updated 3 months ago
- A post-processing script for TinyTracer☆36Updated 2 years ago
- dynamic binary instrumentation, analysis, and patching framework☆95Updated last month
- Windows kernel PDB data parsed into YAML☆41Updated 11 months ago
- Application Verifier Dynamic Fault Injection☆39Updated last month
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆34Updated last year
- ☆31Updated 3 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆42Updated 9 months ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆35Updated last year
- ☆32Updated 7 months ago
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆32Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆31Updated 8 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- LLVM based obfuscation engine☆100Updated 4 months ago
- ☆16Updated 2 years ago
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆47Updated 4 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- Triton based symbolic emulator☆16Updated 2 years ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆105Updated 4 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆53Updated last month
- Intel 64/Windows low-level experiments☆62Updated last month
- Rule Engine for Dynamic Malware Analysis and Research☆25Updated 6 months ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆39Updated 3 years ago
- ☆18Updated 2 years ago