trailofbits / ficklingLinks
A Python pickling decompiler and static analyzer
☆570Updated this week
Alternatives and similar repositories for fickling
Users that are interested in fickling are comparing it to the libraries listed below
Sorting:
- Whole-Program Reverse Engineering with GPT-3☆380Updated 2 years ago
- A collection of my Semgrep rules to facilitate vulnerability research.☆708Updated this week
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆365Updated 2 years ago
- Coverage-based fuzzer for python applications☆237Updated 3 years ago
- Fuzz anything with Program Environment Fuzzing☆391Updated 9 months ago
- CTF challenges designed and implemented in machine learning applications☆180Updated last month
- XBOW Validation Benchmarks☆310Updated 4 months ago
- A toy compiler that can convert Python scripts 🐍 to pickle bytecode 🥒☆133Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆237Updated last year
- The first open-source eBPF sandbox for Python (macOS/Linux): Secure libraries, block RCE, and enforce precise syscall control. Dive into …☆225Updated 2 weeks ago
- 🧠 LLMFuzzer - Fuzzing Framework for Large Language Models 🧠 LLMFuzzer is the first open-source fuzzing framework specifically designed …☆323Updated last year
- Execute ELF files without dropping them on disk☆498Updated last year
- CodeQL queries developed by Trail of Bits☆135Updated 3 weeks ago
- ☆452Updated last month
- Tooling backed by an LLM for performing natural language searches against compiled target binaries. Search for encryption code, password …☆163Updated last year
- Protection against Model Serialization Attacks☆597Updated 2 weeks ago
- The D-CIPHER and NYU CTF baseline LLM Agents built for NYU CTF Bench☆99Updated 2 weeks ago
- A library to assist writing memory-unsafe code in "pure" python, without any imports (i.e. no ctypes etc.)☆228Updated 9 months ago
- Python Command-Line Ghidra Binary Diffing Engine☆705Updated last month
- Adversarial Machine Learning (AML) Capture the Flag (CTF)☆109Updated last year
- ☆65Updated last month
- Source code for the DEF CON 30 CTF Qualifiers.☆264Updated last year
- Infrastructure powering the pwn.college dojo☆402Updated this week
- ☆173Updated 3 years ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,370Updated 9 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆333Updated this week
- Attack/Defense services for the 1st International Cybersecurity Challenge 2022 - Athens☆87Updated 2 years ago
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆58Updated last year
- ☆151Updated 2 months ago
- A tool that automatically creates fuzzing harnesses based on a library☆281Updated 3 years ago