dan1t0 / binaryninja-ollama-plusLinks
Enhanced version of binaryninja-ollama and without using the ollama Python library
☆13Updated 7 months ago
Alternatives and similar repositories for binaryninja-ollama-plus
Users that are interested in binaryninja-ollama-plus are comparing it to the libraries listed below
Sorting:
- Frida plugin for Binary Ninja☆18Updated 7 months ago
- Fuzz Network Traffic☆18Updated 8 months ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆38Updated last year
- Custom Binary Ninja Themes☆12Updated last year
- The Multiplatform Linux Sandbox☆16Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 8 months ago
- PoC code and tools for Black Hat USA 2024☆24Updated last year
- A MBR Fuzzer☆29Updated last year
- BINARLY Research Tools and PoCs☆36Updated 11 months ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- Small Rust programs that do weird things☆30Updated 3 years ago
- Decrypt encrypted SonicOSX firmware images☆16Updated 6 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 4 months ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Piotr - IoT firmware emulation instrumentation for training and research☆64Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 3 years ago
- ☆125Updated last year
- This Binary Ninja plugin is written in Python 3 and it aims to assist with reverse engineering and vulnerability research. It dumps the P…☆39Updated 2 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- The Damn Vulnerable Router Firmware Project☆31Updated 7 years ago
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆10Updated 3 years ago
- Still point in moving world.☆51Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- ☆28Updated 7 months ago
- Wrapper around Ghidra's analyzeHeadless script☆13Updated 3 years ago
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- ☆24Updated last year