jonescyber-ai / BlackfyreLinks
☆30Updated 7 months ago
Alternatives and similar repositories for Blackfyre
Users that are interested in Blackfyre are comparing it to the libraries listed below
Sorting:
- ☆64Updated last year
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆72Updated 3 months ago
- Data Scientists Go To Jupyter☆65Updated 5 months ago
- Automated vulnerability discovery and annotation☆67Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆57Updated 2 months ago
- Dusseldorf is an out-of-band security tool to help in security research.☆36Updated last week
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- ☆50Updated last week
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆45Updated 2 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆87Updated 4 months ago
- Dont Gamble with Risk☆14Updated last year
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 2 months ago
- A utility to inspect, validate, sign and verify machine learning model files.☆57Updated 6 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated 3 weeks ago
- A YAML based format for describing tools to LLMs, like man pages but for robots!☆77Updated 3 months ago
- The Dissect module tying all other Dissect modules together. It provides a programming API and command line tools which allow easy access…☆71Updated this week
- ☆17Updated last year
- ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. T…☆50Updated 9 months ago
- Sandbox samples and monitor them with kunai☆26Updated last month
- Rules shared by the community from 100 Days of YARA 2025☆35Updated 6 months ago
- ☆28Updated 11 months ago
- ☆77Updated last year
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Updated 2 years ago
- Minimal workflows☆20Updated last year
- ☆47Updated 9 months ago
- A Completely Modular LLM Reverse Engineering, Red Teaming, and Vulnerability Research Framework.☆50Updated 9 months ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆64Updated last year
- ☆43Updated last year
- ☆38Updated 2 weeks ago