jonescyber-ai / BlackfyreLinks
☆33Updated 3 weeks ago
Alternatives and similar repositories for Blackfyre
Users that are interested in Blackfyre are comparing it to the libraries listed below
Sorting:
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 6 months ago
- ☆54Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- Data Scientists Go To Jupyter☆67Updated 8 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆94Updated 5 months ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆95Updated last month
- A utility to inspect, validate, sign and verify machine learning model files.☆61Updated 9 months ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆80Updated 6 months ago
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆62Updated 6 months ago
- Example agents for the Dreadnode platform☆19Updated last week
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆122Updated 4 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆334Updated last week
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆52Updated last year
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆77Updated last week
- Binary Exploitation Phrack CTF Challenge☆69Updated 3 months ago
- ☆28Updated last year
- ☆64Updated this week
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 2 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- A very simple open source implementation of Google's Project Naptime☆173Updated 8 months ago
- Examine Chrome extensions for security issues☆88Updated 2 weeks ago
- Repository that contains a set of purposefully erroneous Yara rules.☆60Updated 4 months ago
- Rules shared by the community from 100 Days of YARA 2025☆37Updated 10 months ago
- PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and t…☆48Updated this week
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆51Updated 2 months ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆83Updated 3 months ago
- ☆64Updated last year
- Dont Gamble with Risk☆14Updated last year
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆164Updated last year
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆149Updated last week