weirdmachine64 / GhidraGPTLinks
Integrate LLM models directly into Ghidra for automated code rewrite and analysis.
☆225Updated 2 weeks ago
Alternatives and similar repositories for GhidraGPT
Users that are interested in GhidraGPT are comparing it to the libraries listed below
Sorting:
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆186Updated last year
- Modern web-based distributed hashcracking solution, built on hashcat☆188Updated last week
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆287Updated 5 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆261Updated last week
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆104Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 9 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆103Updated 2 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆173Updated 2 weeks ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆38Updated 5 months ago
- ☆236Updated last year
- MITM proxy for TCP/TLS/DTLS/UDP traffic, with STARTTLS, IoT, Thick Client and more.☆628Updated 3 weeks ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆270Updated 3 weeks ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆29Updated last month
- ☆64Updated 7 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Updated last year
- Application Fuzzing: Tools, Techniques, and Best Practices☆174Updated last year
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆292Updated last month
- Cisco IOS Security Inspector☆39Updated this week
- ⚔️ A command-line tool for IP address and URL obfuscation/de-obfuscation, providing diverse techniques for enhanced privacy and security.☆27Updated 8 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Updated 9 months ago
- ☆330Updated this week
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆94Updated 3 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆419Updated 3 weeks ago
- NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive secu…☆503Updated this week
- Multi-instance Ghidra plugin with HATEOAS REST API and MCP bridge for AI-assisted reverse engineering, binary analysis, and decompilation☆133Updated 3 weeks ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆80Updated 3 months ago
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆59Updated 4 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆72Updated 3 months ago
- Darkweb_Crawler - is an advanced, stealthy Python-based dark web intelligence platform designed for authorized security professionals and…☆105Updated last month