dnakov / r2d2Links
π€π΄ββ οΈ radare2 plugin for GPT-4 π¦. Solve crackmes automatically πͺ
β279Updated last year
Alternatives and similar repositories for r2d2
Users that are interested in r2d2 are comparing it to the libraries listed below
Sorting:
- LLM-based reversing for radare2β347Updated this week
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.β169Updated last year
- Comprehensive toolkit for Ghidra headless.β362Updated 7 months ago
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock β¦β209Updated 3 weeks ago
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password β¦β163Updated last year
- Obfu[DE]scate is a de-obfuscation tool for Android APKs that uses fuzzy comparison logic to identify similarities between functions, evenβ¦β183Updated last year
- Frida-based tracer for easier reverse-engineering on Android, iOS, Linux, Windows and most related architectures.β570Updated last month
- β131Updated 2 years ago
- An automatic Blind ROP exploitation toolβ208Updated 2 years ago
- Hack-A-Sat Qualifiers Writeupsβ257Updated 2 years ago
- Slides and videos from my public speeches / conferencesβ78Updated last week
- Provides automated reverse engineering assistance through the use of local large language models (LLMs) on consumer hardware.β1,002Updated last year
- A collection of Ghidra scripts, including the GPT-3 powered code analyser and annotator, G-3PO.β311Updated 2 years ago
- β717Updated last year
- Brings the power of ChatGPT to Ghidra!β159Updated last year
- Application Fuzzing: Tools, Techniques, and Best Practicesβ174Updated last year
- β234Updated last year
- A list of useful tools for Malware Analysis (will be updated regularly)β153Updated 4 months ago
- Search engine for CTF writeups with instant results.β152Updated 9 months ago
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reversβ¦β269Updated last week
- AI-Powered Malware Analysis & Threat Intelligence for Ghidra Transform your static analysis workflow with cutting-edge AI capabilities, cβ¦β150Updated 3 months ago
- Workshop on firmware reverse engineeringβ348Updated 2 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasionsβ169Updated last year
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.β321Updated last year
- β109Updated 11 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,β¦β334Updated last week
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binariesβ370Updated last month
- β207Updated last year
- π€© Emoji shellcoding tools for RISC-V (32-bit and 64-bit)β176Updated 4 months ago
- Docker container for quickly analyzing Linux malwareβ82Updated 2 years ago