- China
- All languages
- AIDL
- Assembly
- C
- C#
- C++
- CSS
- CodeQL
- Dart
- Dockerfile
- FreeMarker
- Go
- HTML
- Haskell
- Java
- JavaScript
- Kotlin
- LLVM
- Lua
- M
- MATLAB
- MDX
- Makefile
- Max
- Meson
- OCaml
- Objective-C
- Objective-C++
- PHP
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- SCSS
- SMT
- Scala
- Shell
- Solidity
- Starlark
- Swift
- TypeScript
- Verilog
- Vue
- XSLT
- YARA
Starred repositories
AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.
A Binary Ninja plugin containing an MCP server that enables seamless integration with your favorite LLM/MCP client.
Awesome Large Language Models for Vulnerability Detection
💫 Toolkit to help you get started with Spec-Driven Development
Mobile-Agent: The Powerful GUI Agent Family
Driving all platforms UI automation with vision-based model
An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the ACE protocol used in Siri Dictation communications.
A Model Context Protocol (MCP) server for automating iPhone tasks with Appium. Supports app control, UI interactions, and screenshot capture via streamable HTTP.
A Binary Ninja plugin for analyzing Swift binaries
Escape macOS Sandbox using sharedfilelistd exploit
nightuhu / security-research
Forked from google/security-researchThis project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container
IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformations
34306 / IOSurface_poc18
Forked from tomitokics/IOSurface_poc18App with PoC of CVE-2024-44285
[CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.
A PS5 hypervisor exploit for 1.xx-2xx firmwares.
Hacking Windows through iTunes - Local Privilege Escalation 0-day
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
crisprss / CVE-2024-44193
Forked from mbog14/CVE-2024-44193Hacking Windows through iTunes - Local Privilege Escalation 0-day
视频硬字幕提取,生成srt文件。无需申请第三方API,本地实现文本识别。基于深度学习的视频字幕提取框架,包含字幕区域检测、字幕内容提取。A GUI tool for extracting hard-coded subtitle (hardsub) from videos and generating srt files.