Stars
Provides automated reverse engineering assistance through the use of local large language models (LLMs) on consumer hardware.
My repository to store all the examples I do about symbolic execution
Recent symbolic execution papers and tools.
Another LLVM-obfuscator based on LLVM-17. A fork of Arkari
Patch iOS Apps, The Easy Way, Without Jailbreak.
Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android
An IntelliJ IDEA plugin for working on Ghidra Extensions.
hexa-synacktiv / tenet
Forked from gaasedelen/tenetA Trace Explorer for Reverse Engineers
Python Command-Line Ghidra Binary Diffing Engine
Pyhidra is a Python library that provides direct access to the Ghidra API within a native CPython interpreter using jpype.
Resources accompanying the LibAFL workshop blog post
CodeQL queries developed by Trail of Bits
Enable WebView debugging and add vConsole in it. Support WebView, TBS X5, UC U4, Crosswalk(XWalk), XWeb. 启用 WebView 调试并添加 vConsole,支持 WebView、TBS X5、UC U4、Crosswalk(XWalk)、XWeb。
The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).
Automatically exported from code.google.com/p/sandrop
A cross-platform framework using Vue.js
AndroidHttpCapture网络诊断工具 是一款Android手机抓包软件 主要功能包括:手机端抓包、PING/DNS/TraceRoute诊断、抓包HAR数据上传分享。你也可以看成是Android版的"Fiddler" \(^o^)/~
Fuzzing the Kernel Using Unicornafl and AFL++
ChatGLM-6B: An Open Bilingual Dialogue Language Model | 开源双语对话语言模型
A collection of Semgrep rules derived from the OWASP MASTG specifically for Android applications.