llnl / OGhidraLinks
OGhidra bridges Large Language Models (LLMs) via Ollama with the Ghidra reverse engineering platform, enabling AI-driven binary analysis through natural language. Interact with Ghidra using conversational queries and automate complex reverse engineering workflows.
☆64Updated last week
Alternatives and similar repositories for OGhidra
Users that are interested in OGhidra are comparing it to the libraries listed below
Sorting:
- Frida plugin for Binary Ninja☆19Updated 11 months ago
- Semantic strings based on tree-sitter☆17Updated 10 months ago
- Bin2Wrong: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers☆59Updated 7 months ago
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆17Updated last year
- weggli ruleset scanner for source code and binaries☆35Updated last month
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 3 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆33Updated 11 months ago
- Python bindings for BochsCPU☆37Updated 5 months ago
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆86Updated 3 years ago
- CodeHawk Binary Analyzer for malware analysis and general reverse engineering☆37Updated 2 months ago
- Symbolic execution for RISC-V machine code based on the formal LibRISCV ISA model☆54Updated 7 months ago
- Python interface for Binexport, the Bindiff export format☆19Updated 3 weeks ago
- A tool for firmware cartography☆162Updated last month
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆50Updated last year
- ☆65Updated 5 months ago
- IDB parser☆24Updated last month
- Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.☆102Updated last week
- Diaphora Machine Learning tools and datasets☆23Updated last year
- ☆35Updated 11 months ago
- CTF Challenge for CSAW Finals 2021☆12Updated 4 years ago
- Vulnerability research assistant that extracts pseudocode from the IDA Hex-Rays decompiler.☆96Updated last week
- Vulnerabilities advisories and PoC☆18Updated last month
- iTLB multihit PoC☆42Updated 2 years ago
- A demontration of disassemblers generated by sleigh2rust☆13Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated 2 years ago
- Ghidra Headless Python VScode Skeleton with Devcontainer Super Powers☆59Updated 6 months ago
- This tool bruteforces the file offset and base load address for a raw binary program file☆15Updated last week
- IFL - Interactive Functions List (plugin for Binary Ninja)☆25Updated last year
- Ghidra P-Code emulation and static LLVM lifting in Python☆38Updated 3 years ago
- Library to manipulate and create Sourcetrail databases☆23Updated 7 months ago