weirdmachine64 / GhidraGPTLinks
Integrate LLM models directly into Ghidra for automated code refactoring and analysis.
☆242Updated last month
Alternatives and similar repositories for GhidraGPT
Users that are interested in GhidraGPT are comparing it to the libraries listed below
Sorting:
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆186Updated last year
- ☆82Updated 8 months ago
- Self-contained script for cleaning forensic traces on Linux, macOS, and Windows.☆289Updated 6 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆191Updated this week
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆105Updated last year
- ☆243Updated last year
- Payload for jpg file☆61Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆41Updated 10 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆30Updated 2 months ago
- Multi-instance Ghidra plugin with HATEOAS REST API and MCP bridge for AI-assisted reverse engineering, binary analysis, and decompilation☆169Updated last month
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆284Updated 2 weeks ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Updated 3 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆96Updated 5 months ago
- An archive of 0day.today exploits☆341Updated 6 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆38Updated 6 months ago
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆58Updated 6 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆175Updated last year
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆220Updated 10 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 4 months ago
- Generate backdoored RSA keys using SETUP☆231Updated 2 months ago
- WiFi Geolocation Spoofing with the ESP8266☆76Updated 7 years ago
- This repository consists of extensions, that hacktron uses to execute specific workflows in CLI.☆86Updated last month
- Cisco IOS Security Inspector☆40Updated last month
- ⚔️ A command-line tool for IP address and URL obfuscation/de-obfuscation, providing diverse techniques for enhanced privacy and security.☆27Updated 9 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆74Updated 4 months ago
- Analyze Android native `.so` files☆119Updated 6 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase☆67Updated 6 months ago
- The app is used to download posts from Telegram feeds and save them to text files for later OSINT AI use☆53Updated 10 months ago