dnakov / r2d2
π€π΄ββ οΈ radare2 plugin for GPT-4 π¦. Solve crackmes automatically πͺ
β262Updated 7 months ago
Related projects: β
- Comprehensive toolkit for Ghidra headless.β345Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.β450Updated last month
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.β278Updated 8 months ago
- local language model for radare2β66Updated this week
- β114Updated this week
- Provides automated reverse engineering assistance through the use of local large language models (LLMs) on consumer hardware.β786Updated 2 months ago
- β291Updated last month
- Callisto - An Intelligent Binary Vulnerability Analysis Toolβ346Updated last year
- A public collection of POCs & Exploits for the vulnerabilities I discoveredβ352Updated 6 months ago
- Brings the power of ChatGPT to Ghidra!β110Updated last month
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binariesβ347Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasionsβ157Updated 5 months ago
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.β292Updated last year
- β122Updated 10 months ago
- Hack-A-Sat Qualifiers Writeupsβ219Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock β¦β161Updated 7 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The toβ¦β476Updated 4 months ago
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functionsβ116Updated last month
- Python Command-Line Ghidra Binary Diffing Engineβ502Updated 2 months ago
- β197Updated last year
- Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .classβ¦β216Updated 2 months ago
- πA curated list of modern Android exploitation conference talks.β431Updated this week
- Damn Vulnerable UEFIβ238Updated last week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offerβ¦β339Updated 5 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)β236Updated 7 months ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway aβ¦β258Updated 6 months ago
- Wordlist to crack .zip-file passwordβ201Updated 2 years ago
- ASLR bypass without infoleakβ150Updated 2 years ago
- An automatic Blind ROP exploitation toolβ186Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.β624Updated last month